Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-70873 (GCVE-0-2025-70873)
Vulnerability from cvelistv5 – Published: 2026-03-12 00:00 – Updated: 2026-03-14 03:35
VLAI?
EPSS
Summary
An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.
Severity ?
7.5 (High)
CWE
- n/a
Assigner
References
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-70873",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2026-03-14T03:33:48.480447Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-244",
"description": "CWE-244 Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-14T03:35:18.796Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-03-12T18:44:30.960Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"url": "https://sqlite.org/forum/forumpost/761eac3c82"
},
{
"url": "https://sqlite.org/src/info/3d459f1fb1bd1b5e"
},
{
"url": "https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2025-70873",
"datePublished": "2026-03-12T00:00:00.000Z",
"dateReserved": "2026-01-09T00:00:00.000Z",
"dateUpdated": "2026-03-14T03:35:18.796Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-70873\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2026-03-12T19:16:15.933\",\"lastModified\":\"2026-03-16T14:18:02.437\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.\"},{\"lang\":\"es\",\"value\":\"Un problema de revelaci\u00f3n de informaci\u00f3n en la funci\u00f3n zipfileInflate de la extensi\u00f3n zipfile en SQLite v3.51.1 y versiones anteriores permite a los atacantes obtener memoria del mont\u00f3n mediante el suministro de un archivo ZIP manipulado.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-244\"}]}],\"references\":[{\"url\":\"https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://sqlite.org/forum/forumpost/761eac3c82\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://sqlite.org/src/info/3d459f1fb1bd1b5e\",\"source\":\"cve@mitre.org\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-70873\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2026-03-14T03:33:48.480447Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-244\", \"description\": \"CWE-244 Improper Clearing of Heap Memory Before Release (\u0027Heap Inspection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2026-03-14T03:35:12.316Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://sqlite.org/forum/forumpost/761eac3c82\"}, {\"url\": \"https://sqlite.org/src/info/3d459f1fb1bd1b5e\"}, {\"url\": \"https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2026-03-12T18:44:30.960Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-70873\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-03-14T03:35:18.796Z\", \"dateReserved\": \"2026-01-09T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2026-03-12T00:00:00.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
FKIE_CVE-2025-70873
Vulnerability from fkie_nvd - Published: 2026-03-12 19:16 - Updated: 2026-03-16 14:18
Severity ?
Summary
An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file."
},
{
"lang": "es",
"value": "Un problema de revelaci\u00f3n de informaci\u00f3n en la funci\u00f3n zipfileInflate de la extensi\u00f3n zipfile en SQLite v3.51.1 y versiones anteriores permite a los atacantes obtener memoria del mont\u00f3n mediante el suministro de un archivo ZIP manipulado."
}
],
"id": "CVE-2025-70873",
"lastModified": "2026-03-16T14:18:02.437",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2026-03-12T19:16:15.933",
"references": [
{
"source": "cve@mitre.org",
"url": "https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054"
},
{
"source": "cve@mitre.org",
"url": "https://sqlite.org/forum/forumpost/761eac3c82"
},
{
"source": "cve@mitre.org",
"url": "https://sqlite.org/src/info/3d459f1fb1bd1b5e"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-244"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
SUSE-SU-2026:20794-1
Vulnerability from csaf_suse - Published: 2026-03-19 12:20 - Updated: 2026-03-19 12:20Summary
Security update for sqlite3
Severity
Moderate
Notes
Title of the patch: Security update for sqlite3
Description of the patch: This update for sqlite3 fixes the following issues:
Update to version 3.51.3:
- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).
- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).
Changelog:
Update to version 3.51.3:
* Fix the WAL-reset database corruption bug:
https://sqlite.org/wal.html#walresetbug
* Other minor bug fixes.
Update to version 3.51.2:
* Fix an obscure deadlock in the new broken-posix-lock detection
logic.
* Fix multiple problems in the EXISTS-to-JOIN optimization.
Update to version 3.51.1:
* Fix incorrect results from nested EXISTS queries caused by the
optimization in item 6b in the 3.51.0 release.
* Fix a latent bug in fts5vocab virtual table, exposed by new
optimizations in the 3.51.0 release
Update to version 3.51.0:
* New macros in sqlite3.h:
- SQLITE_SCM_BRANCH -> the name of the branch from which the
source code is taken.
- SQLITE_SCM_TAGS -> space-separated list of tags on the source
code check-in.
- SQLITE_SCM_DATETIME -> ISO-8601 date and time of the source
* Two new JSON functions, jsonb_each() and jsonb_tree() work the
same as the existing json_each() and json_tree() functions
except that they return JSONB for the "value" column when the
"type" is 'array' or 'object'.
* The carray and percentile extensions are now built into the
amalgamation, though they are disabled by default and must be
activated at compile-time using the -DSQLITE_ENABLE_CARRAY
and/or -DSQLITE_ENABLE_PERCENTILE options, respectively.
* Enhancements to TCL Interface:
- Add the -asdict flag to the eval command to have it set the
row data as a dict instead of an array.
- User-defined functions may now break to return an SQL NULL.
* CLI enhancements:
- Increase the precision of ".timer" to microseconds.
- Enhance the "box" and "column" formatting modes to deal with
double-wide characters.
- The ".imposter" command provides read-only imposter tables
that work with VACUUM and do not require the --unsafe-testing
option.
- Add the --ifexists option to the CLI command-line option and
to the .open command.
- Limit columns widths set by the ".width" command to 30,000 or
less, as there is not good reason to have wider columns, but
supporting wider columns provides opportunity to malefactors.
* Performance enhancements:
- Use fewer CPU cycles to commit a read transaction.
- Early detection of joins that return no rows due to one or
more of the tables containing no rows.
- Avoid evaluation of scalar subqueries if the result of the
subquery does not change the result of the overall expression.
- Faster window function queries when using
"BETWEEN :x FOLLOWING AND :y FOLLOWING" with a large :y.
* Add the PRAGMA wal_checkpoint=NOOP; command and the
SQLITE_CHECKPOINT_NOOP argument for sqlite3_wal_checkpoint_v2().
* Add the sqlite3_set_errmsg() API for use by extensions.
* Add the sqlite3_db_status64() API, which works just like the
existing sqlite3_db_status() API except that it returns 64-bit
results.
* Add the SQLITE_DBSTATUS_TEMPBUF_SPILL option to the
sqlite3_db_status() and sqlite3_db_status64() interfaces.
* In the session extension add the sqlite3changeset_apply_v3()
interface.
* For the built-in printf() and the format() SQL function, omit
the leading '-' from negative floating point numbers if the '+'
flag is omitted and the "#" flag is present and all displayed
digits are '0'. Use '%#f' or similar to avoid outputs like
'-0.00' and instead show just '0.00'.
* Improved error messages generated by FTS5.
* Enforce STRICT typing on computed columns.
* Improved support for VxWorks
* JavaScript/WASM now supports 64-bit WASM. The canonical builds
continue to be 32-bit but creating one's own 64-bit build is
now as simple as running "make".
Patchnames: SUSE-SLE-Micro-6.0-631
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for sqlite3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for sqlite3 fixes the following issues:\n\nUpdate to version 3.51.3:\n\n- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).\n- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).\n\nChangelog:\n\nUpdate to version 3.51.3:\n \n * Fix the WAL-reset database corruption bug:\n https://sqlite.org/wal.html#walresetbug\n * Other minor bug fixes.\n \nUpdate to version 3.51.2:\n \n * Fix an obscure deadlock in the new broken-posix-lock detection\n logic.\n * Fix multiple problems in the EXISTS-to-JOIN optimization.\n \nUpdate to version 3.51.1:\n \n * Fix incorrect results from nested EXISTS queries caused by the\n optimization in item 6b in the 3.51.0 release.\n * Fix a latent bug in fts5vocab virtual table, exposed by new\n optimizations in the 3.51.0 release\n \nUpdate to version 3.51.0:\n \n * New macros in sqlite3.h:\n - SQLITE_SCM_BRANCH -\u003e the name of the branch from which the\n source code is taken.\n - SQLITE_SCM_TAGS -\u003e space-separated list of tags on the source\n code check-in.\n - SQLITE_SCM_DATETIME -\u003e ISO-8601 date and time of the source\n * Two new JSON functions, jsonb_each() and jsonb_tree() work the\n same as the existing json_each() and json_tree() functions\n except that they return JSONB for the \"value\" column when the\n \"type\" is \u0027array\u0027 or \u0027object\u0027.\n * The carray and percentile extensions are now built into the\n amalgamation, though they are disabled by default and must be\n activated at compile-time using the -DSQLITE_ENABLE_CARRAY\n and/or -DSQLITE_ENABLE_PERCENTILE options, respectively.\n * Enhancements to TCL Interface:\n - Add the -asdict flag to the eval command to have it set the\n row data as a dict instead of an array.\n - User-defined functions may now break to return an SQL NULL.\n * CLI enhancements:\n - Increase the precision of \".timer\" to microseconds.\n - Enhance the \"box\" and \"column\" formatting modes to deal with\n double-wide characters.\n - The \".imposter\" command provides read-only imposter tables\n that work with VACUUM and do not require the --unsafe-testing\n option.\n - Add the --ifexists option to the CLI command-line option and\n to the .open command.\n - Limit columns widths set by the \".width\" command to 30,000 or\n less, as there is not good reason to have wider columns, but\n supporting wider columns provides opportunity to malefactors.\n * Performance enhancements:\n - Use fewer CPU cycles to commit a read transaction.\n - Early detection of joins that return no rows due to one or\n more of the tables containing no rows.\n - Avoid evaluation of scalar subqueries if the result of the\n subquery does not change the result of the overall expression.\n - Faster window function queries when using\n \"BETWEEN :x FOLLOWING AND :y FOLLOWING\" with a large :y.\n * Add the PRAGMA wal_checkpoint=NOOP; command and the\n SQLITE_CHECKPOINT_NOOP argument for sqlite3_wal_checkpoint_v2().\n * Add the sqlite3_set_errmsg() API for use by extensions.\n * Add the sqlite3_db_status64() API, which works just like the\n existing sqlite3_db_status() API except that it returns 64-bit\n results.\n * Add the SQLITE_DBSTATUS_TEMPBUF_SPILL option to the\n sqlite3_db_status() and sqlite3_db_status64() interfaces.\n * In the session extension add the sqlite3changeset_apply_v3()\n interface.\n * For the built-in printf() and the format() SQL function, omit\n the leading \u0027-\u0027 from negative floating point numbers if the \u0027+\u0027\n flag is omitted and the \"#\" flag is present and all displayed\n digits are \u00270\u0027. Use \u0027%#f\u0027 or similar to avoid outputs like\n \u0027-0.00\u0027 and instead show just \u00270.00\u0027.\n * Improved error messages generated by FTS5.\n * Enforce STRICT typing on computed columns.\n * Improved support for VxWorks\n * JavaScript/WASM now supports 64-bit WASM. The canonical builds\n continue to be 32-bit but creating one\u0027s own 64-bit build is\n now as simple as running \"make\".\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-631",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20794-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20794-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620794-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20794-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024895.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254670",
"url": "https://bugzilla.suse.com/1254670"
},
{
"category": "self",
"summary": "SUSE Bug 1259619",
"url": "https://bugzilla.suse.com/1259619"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-70873 page",
"url": "https://www.suse.com/security/cve/CVE-2025-70873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-7709 page",
"url": "https://www.suse.com/security/cve/CVE-2025-7709/"
}
],
"title": "Security update for sqlite3",
"tracking": {
"current_release_date": "2026-03-19T12:20:26Z",
"generator": {
"date": "2026-03-19T12:20:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20794-1",
"initial_release_date": "2026-03-19T12:20:26Z",
"revision_history": [
{
"date": "2026-03-19T12:20:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-1.1.aarch64",
"product": {
"name": "libsqlite3-0-3.51.3-1.1.aarch64",
"product_id": "libsqlite3-0-3.51.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-1.1.s390x",
"product": {
"name": "libsqlite3-0-3.51.3-1.1.s390x",
"product_id": "libsqlite3-0-3.51.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-1.1.x86_64",
"product": {
"name": "libsqlite3-0-3.51.3-1.1.x86_64",
"product_id": "libsqlite3-0-3.51.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-1.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.aarch64"
},
"product_reference": "libsqlite3-0-3.51.3-1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-1.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.s390x"
},
"product_reference": "libsqlite3-0-3.51.3-1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-70873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-70873"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.aarch64",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.s390x",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-70873",
"url": "https://www.suse.com/security/cve/CVE-2025-70873"
},
{
"category": "external",
"summary": "SUSE Bug 1259619 for CVE-2025-70873",
"url": "https://bugzilla.suse.com/1259619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.aarch64",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.s390x",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.aarch64",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.s390x",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-19T12:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-70873"
},
{
"cve": "CVE-2025-7709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-7709"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow exists in the FTS5 https://sqlite.org/fts5.html extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.aarch64",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.s390x",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-7709",
"url": "https://www.suse.com/security/cve/CVE-2025-7709"
},
{
"category": "external",
"summary": "SUSE Bug 1254670 for CVE-2025-7709",
"url": "https://bugzilla.suse.com/1254670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.aarch64",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.s390x",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.aarch64",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.s390x",
"SUSE Linux Micro 6.0:libsqlite3-0-3.51.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-19T12:20:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-7709"
}
]
}
SUSE-SU-2026:0955-1
Vulnerability from csaf_suse - Published: 2026-03-23 02:34 - Updated: 2026-03-23 02:34Summary
Security update for sqlite3
Severity
Moderate
Notes
Title of the patch: Security update for sqlite3
Description of the patch: This update for sqlite3 fixes the following issues:
Update to 3.51.3:
- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).
- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).
Changelog:
* Fix the WAL-reset database corruption bug:
https://sqlite.org/wal.html#walresetbug
Patchnames: SUSE-2026-955,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-955
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for sqlite3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for sqlite3 fixes the following issues:\n\nUpdate to 3.51.3:\n\n- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).\n- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).\n\nChangelog:\n\n * Fix the WAL-reset database corruption bug:\n https://sqlite.org/wal.html#walresetbug\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-955,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-955",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0955-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0955-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260955-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0955-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024793.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254670",
"url": "https://bugzilla.suse.com/1254670"
},
{
"category": "self",
"summary": "SUSE Bug 1259619",
"url": "https://bugzilla.suse.com/1259619"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-70873 page",
"url": "https://www.suse.com/security/cve/CVE-2025-70873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-7709 page",
"url": "https://www.suse.com/security/cve/CVE-2025-7709/"
}
],
"title": "Security update for sqlite3",
"tracking": {
"current_release_date": "2026-03-23T02:34:14Z",
"generator": {
"date": "2026-03-23T02:34:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0955-1",
"initial_release_date": "2026-03-23T02:34:14Z",
"revision_history": [
{
"date": "2026-03-23T02:34:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-9.47.1.aarch64",
"product": {
"name": "lemon-3.51.3-9.47.1.aarch64",
"product_id": "lemon-3.51.3-9.47.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-9.47.1.aarch64",
"product": {
"name": "libsqlite3-0-3.51.3-9.47.1.aarch64",
"product_id": "libsqlite3-0-3.51.3-9.47.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-9.47.1.aarch64",
"product": {
"name": "sqlite3-3.51.3-9.47.1.aarch64",
"product_id": "sqlite3-3.51.3-9.47.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-9.47.1.aarch64",
"product": {
"name": "sqlite3-devel-3.51.3-9.47.1.aarch64",
"product_id": "sqlite3-devel-3.51.3-9.47.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-9.47.1.aarch64",
"product": {
"name": "sqlite3-tcl-3.51.3-9.47.1.aarch64",
"product_id": "sqlite3-tcl-3.51.3-9.47.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-64bit-3.51.3-9.47.1.aarch64_ilp32",
"product": {
"name": "libsqlite3-0-64bit-3.51.3-9.47.1.aarch64_ilp32",
"product_id": "libsqlite3-0-64bit-3.51.3-9.47.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-9.47.1.i586",
"product": {
"name": "lemon-3.51.3-9.47.1.i586",
"product_id": "lemon-3.51.3-9.47.1.i586"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-9.47.1.i586",
"product": {
"name": "libsqlite3-0-3.51.3-9.47.1.i586",
"product_id": "libsqlite3-0-3.51.3-9.47.1.i586"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-9.47.1.i586",
"product": {
"name": "sqlite3-3.51.3-9.47.1.i586",
"product_id": "sqlite3-3.51.3-9.47.1.i586"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-9.47.1.i586",
"product": {
"name": "sqlite3-devel-3.51.3-9.47.1.i586",
"product_id": "sqlite3-devel-3.51.3-9.47.1.i586"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-9.47.1.i586",
"product": {
"name": "sqlite3-tcl-3.51.3-9.47.1.i586",
"product_id": "sqlite3-tcl-3.51.3-9.47.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "sqlite3-doc-3.51.3-9.47.1.noarch",
"product": {
"name": "sqlite3-doc-3.51.3-9.47.1.noarch",
"product_id": "sqlite3-doc-3.51.3-9.47.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-9.47.1.ppc64le",
"product": {
"name": "lemon-3.51.3-9.47.1.ppc64le",
"product_id": "lemon-3.51.3-9.47.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-9.47.1.ppc64le",
"product": {
"name": "libsqlite3-0-3.51.3-9.47.1.ppc64le",
"product_id": "libsqlite3-0-3.51.3-9.47.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-9.47.1.ppc64le",
"product": {
"name": "sqlite3-3.51.3-9.47.1.ppc64le",
"product_id": "sqlite3-3.51.3-9.47.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-9.47.1.ppc64le",
"product": {
"name": "sqlite3-devel-3.51.3-9.47.1.ppc64le",
"product_id": "sqlite3-devel-3.51.3-9.47.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-9.47.1.ppc64le",
"product": {
"name": "sqlite3-tcl-3.51.3-9.47.1.ppc64le",
"product_id": "sqlite3-tcl-3.51.3-9.47.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-9.47.1.s390",
"product": {
"name": "lemon-3.51.3-9.47.1.s390",
"product_id": "lemon-3.51.3-9.47.1.s390"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-9.47.1.s390",
"product": {
"name": "libsqlite3-0-3.51.3-9.47.1.s390",
"product_id": "libsqlite3-0-3.51.3-9.47.1.s390"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-9.47.1.s390",
"product": {
"name": "sqlite3-3.51.3-9.47.1.s390",
"product_id": "sqlite3-3.51.3-9.47.1.s390"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-9.47.1.s390",
"product": {
"name": "sqlite3-devel-3.51.3-9.47.1.s390",
"product_id": "sqlite3-devel-3.51.3-9.47.1.s390"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-9.47.1.s390",
"product": {
"name": "sqlite3-tcl-3.51.3-9.47.1.s390",
"product_id": "sqlite3-tcl-3.51.3-9.47.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-9.47.1.s390x",
"product": {
"name": "lemon-3.51.3-9.47.1.s390x",
"product_id": "lemon-3.51.3-9.47.1.s390x"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-9.47.1.s390x",
"product": {
"name": "libsqlite3-0-3.51.3-9.47.1.s390x",
"product_id": "libsqlite3-0-3.51.3-9.47.1.s390x"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-32bit-3.51.3-9.47.1.s390x",
"product": {
"name": "libsqlite3-0-32bit-3.51.3-9.47.1.s390x",
"product_id": "libsqlite3-0-32bit-3.51.3-9.47.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-9.47.1.s390x",
"product": {
"name": "sqlite3-3.51.3-9.47.1.s390x",
"product_id": "sqlite3-3.51.3-9.47.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-9.47.1.s390x",
"product": {
"name": "sqlite3-devel-3.51.3-9.47.1.s390x",
"product_id": "sqlite3-devel-3.51.3-9.47.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-9.47.1.s390x",
"product": {
"name": "sqlite3-tcl-3.51.3-9.47.1.s390x",
"product_id": "sqlite3-tcl-3.51.3-9.47.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-9.47.1.x86_64",
"product": {
"name": "lemon-3.51.3-9.47.1.x86_64",
"product_id": "lemon-3.51.3-9.47.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-9.47.1.x86_64",
"product": {
"name": "libsqlite3-0-3.51.3-9.47.1.x86_64",
"product_id": "libsqlite3-0-3.51.3-9.47.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-32bit-3.51.3-9.47.1.x86_64",
"product": {
"name": "libsqlite3-0-32bit-3.51.3-9.47.1.x86_64",
"product_id": "libsqlite3-0-32bit-3.51.3-9.47.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-9.47.1.x86_64",
"product": {
"name": "sqlite3-3.51.3-9.47.1.x86_64",
"product_id": "sqlite3-3.51.3-9.47.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-9.47.1.x86_64",
"product": {
"name": "sqlite3-devel-3.51.3-9.47.1.x86_64",
"product_id": "sqlite3-devel-3.51.3-9.47.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-9.47.1.x86_64",
"product": {
"name": "sqlite3-tcl-3.51.3-9.47.1.x86_64",
"product_id": "sqlite3-tcl-3.51.3-9.47.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-9.47.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-3.51.3-9.47.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-9.47.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-32bit-3.51.3-9.47.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-32bit-3.51.3-9.47.1.x86_64"
},
"product_reference": "libsqlite3-0-32bit-3.51.3-9.47.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-9.47.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-3.51.3-9.47.1.x86_64"
},
"product_reference": "sqlite3-3.51.3-9.47.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-9.47.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-devel-3.51.3-9.47.1.x86_64"
},
"product_reference": "sqlite3-devel-3.51.3-9.47.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-9.47.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-tcl-3.51.3-9.47.1.x86_64"
},
"product_reference": "sqlite3-tcl-3.51.3-9.47.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-70873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-70873"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-32bit-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-devel-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-tcl-3.51.3-9.47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-70873",
"url": "https://www.suse.com/security/cve/CVE-2025-70873"
},
{
"category": "external",
"summary": "SUSE Bug 1259619 for CVE-2025-70873",
"url": "https://bugzilla.suse.com/1259619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-32bit-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-devel-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-tcl-3.51.3-9.47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-32bit-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-devel-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-tcl-3.51.3-9.47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T02:34:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-70873"
},
{
"cve": "CVE-2025-7709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-7709"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow exists in the FTS5 https://sqlite.org/fts5.html extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-32bit-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-devel-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-tcl-3.51.3-9.47.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-7709",
"url": "https://www.suse.com/security/cve/CVE-2025-7709"
},
{
"category": "external",
"summary": "SUSE Bug 1254670 for CVE-2025-7709",
"url": "https://bugzilla.suse.com/1254670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-32bit-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-devel-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-tcl-3.51.3-9.47.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libsqlite3-0-32bit-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-devel-3.51.3-9.47.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:sqlite3-tcl-3.51.3-9.47.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T02:34:14Z",
"details": "moderate"
}
],
"title": "CVE-2025-7709"
}
]
}
SUSE-SU-2026:1065-1
Vulnerability from csaf_suse - Published: 2026-03-26 10:38 - Updated: 2026-03-26 10:38Summary
Security update for sqlite3
Severity
Moderate
Notes
Title of the patch: Security update for sqlite3
Description of the patch: This update for sqlite3 fixes the following issues:
Update sqlite3 to 3.51.3:
- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).
- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).
Changelog:
* Fix the WAL-reset database corruption bug:
https://sqlite.org/wal.html#walresetbug
Patchnames: SUSE-2026-1065,SUSE-SLE-Micro-5.3-2026-1065,SUSE-SLE-Micro-5.4-2026-1065,SUSE-SLE-Micro-5.5-2026-1065,SUSE-SLE-Module-Basesystem-15-SP7-2026-1065,SUSE-SUSE-MicroOS-5.2-2026-1065,openSUSE-SLE-15.6-2026-1065
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for sqlite3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for sqlite3 fixes the following issues:\n\nUpdate sqlite3 to 3.51.3:\n\n- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).\n- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).\n\nChangelog:\n\n * Fix the WAL-reset database corruption bug:\n https://sqlite.org/wal.html#walresetbug\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-1065,SUSE-SLE-Micro-5.3-2026-1065,SUSE-SLE-Micro-5.4-2026-1065,SUSE-SLE-Micro-5.5-2026-1065,SUSE-SLE-Module-Basesystem-15-SP7-2026-1065,SUSE-SUSE-MicroOS-5.2-2026-1065,openSUSE-SLE-15.6-2026-1065",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_1065-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:1065-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261065-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:1065-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024944.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254670",
"url": "https://bugzilla.suse.com/1254670"
},
{
"category": "self",
"summary": "SUSE Bug 1259619",
"url": "https://bugzilla.suse.com/1259619"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-70873 page",
"url": "https://www.suse.com/security/cve/CVE-2025-70873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-7709 page",
"url": "https://www.suse.com/security/cve/CVE-2025-7709/"
}
],
"title": "Security update for sqlite3",
"tracking": {
"current_release_date": "2026-03-26T10:38:26Z",
"generator": {
"date": "2026-03-26T10:38:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:1065-1",
"initial_release_date": "2026-03-26T10:38:26Z",
"revision_history": [
{
"date": "2026-03-26T10:38:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-150000.3.39.1.aarch64",
"product": {
"name": "lemon-3.51.3-150000.3.39.1.aarch64",
"product_id": "lemon-3.51.3-150000.3.39.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"product": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"product_id": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-150000.3.39.1.aarch64",
"product": {
"name": "sqlite3-3.51.3-150000.3.39.1.aarch64",
"product_id": "sqlite3-3.51.3-150000.3.39.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"product": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"product_id": "sqlite3-devel-3.51.3-150000.3.39.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"product": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"product_id": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-64bit-3.51.3-150000.3.39.1.aarch64_ilp32",
"product": {
"name": "libsqlite3-0-64bit-3.51.3-150000.3.39.1.aarch64_ilp32",
"product_id": "libsqlite3-0-64bit-3.51.3-150000.3.39.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-150000.3.39.1.i586",
"product": {
"name": "lemon-3.51.3-150000.3.39.1.i586",
"product_id": "lemon-3.51.3-150000.3.39.1.i586"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-150000.3.39.1.i586",
"product": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.i586",
"product_id": "libsqlite3-0-3.51.3-150000.3.39.1.i586"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-150000.3.39.1.i586",
"product": {
"name": "sqlite3-3.51.3-150000.3.39.1.i586",
"product_id": "sqlite3-3.51.3-150000.3.39.1.i586"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-150000.3.39.1.i586",
"product": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.i586",
"product_id": "sqlite3-devel-3.51.3-150000.3.39.1.i586"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.i586",
"product": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.i586",
"product_id": "sqlite3-tcl-3.51.3-150000.3.39.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "sqlite3-doc-3.51.3-150000.3.39.1.noarch",
"product": {
"name": "sqlite3-doc-3.51.3-150000.3.39.1.noarch",
"product_id": "sqlite3-doc-3.51.3-150000.3.39.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-150000.3.39.1.ppc64le",
"product": {
"name": "lemon-3.51.3-150000.3.39.1.ppc64le",
"product_id": "lemon-3.51.3-150000.3.39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"product": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"product_id": "libsqlite3-0-3.51.3-150000.3.39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-150000.3.39.1.ppc64le",
"product": {
"name": "sqlite3-3.51.3-150000.3.39.1.ppc64le",
"product_id": "sqlite3-3.51.3-150000.3.39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"product": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"product_id": "sqlite3-devel-3.51.3-150000.3.39.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"product": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"product_id": "sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-150000.3.39.1.s390x",
"product": {
"name": "lemon-3.51.3-150000.3.39.1.s390x",
"product_id": "lemon-3.51.3-150000.3.39.1.s390x"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"product": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"product_id": "libsqlite3-0-3.51.3-150000.3.39.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-150000.3.39.1.s390x",
"product": {
"name": "sqlite3-3.51.3-150000.3.39.1.s390x",
"product_id": "sqlite3-3.51.3-150000.3.39.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"product": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"product_id": "sqlite3-devel-3.51.3-150000.3.39.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"product": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"product_id": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-150000.3.39.1.x86_64",
"product": {
"name": "lemon-3.51.3-150000.3.39.1.x86_64",
"product_id": "lemon-3.51.3-150000.3.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"product": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"product_id": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"product": {
"name": "libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"product_id": "libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-150000.3.39.1.x86_64",
"product": {
"name": "sqlite3-3.51.3-150000.3.39.1.x86_64",
"product_id": "sqlite3-3.51.3-150000.3.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"product": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"product_id": "sqlite3-devel-3.51.3-150000.3.39.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"product": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"product_id": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "sqlite3-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-150000.3.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "sqlite3-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "sqlite3-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "sqlite3-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-150000.3.39.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "sqlite3-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-150000.3.39.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "sqlite3-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-150000.3.39.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "sqlite3-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-150000.3.39.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "sqlite3-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-150000.3.39.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-doc-3.51.3-150000.3.39.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-doc-3.51.3-150000.3.39.1.noarch"
},
"product_reference": "sqlite3-doc-3.51.3-150000.3.39.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.s390x"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
},
"product_reference": "sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-70873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-70873"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-doc-3.51.3-150000.3.39.1.noarch",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-70873",
"url": "https://www.suse.com/security/cve/CVE-2025-70873"
},
{
"category": "external",
"summary": "SUSE Bug 1259619 for CVE-2025-70873",
"url": "https://bugzilla.suse.com/1259619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-doc-3.51.3-150000.3.39.1.noarch",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-doc-3.51.3-150000.3.39.1.noarch",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T10:38:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-70873"
},
{
"cve": "CVE-2025-7709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-7709"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow exists in the FTS5 https://sqlite.org/fts5.html extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-doc-3.51.3-150000.3.39.1.noarch",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-7709",
"url": "https://www.suse.com/security/cve/CVE-2025-7709"
},
{
"category": "external",
"summary": "SUSE Bug 1254670 for CVE-2025-7709",
"url": "https://bugzilla.suse.com/1254670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-doc-3.51.3-150000.3.39.1.noarch",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.3:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.4:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Micro 5.5:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:libsqlite3-0-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:libsqlite3-0-32bit-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-devel-3.51.3-150000.3.39.1.x86_64",
"openSUSE Leap 15.6:sqlite3-doc-3.51.3-150000.3.39.1.noarch",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.aarch64",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.ppc64le",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.s390x",
"openSUSE Leap 15.6:sqlite3-tcl-3.51.3-150000.3.39.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-26T10:38:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-7709"
}
]
}
SUSE-SU-2026:20771-1
Vulnerability from csaf_suse - Published: 2026-03-23 09:46 - Updated: 2026-03-23 09:46Summary
Security update for sqlite3
Severity
Moderate
Notes
Title of the patch: Security update for sqlite3
Description of the patch: This update for sqlite3 fixes the following issues:
Update to sqlite3 3.51.3:
- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).
- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).
Changelog:
Update to version 3.51.3:
* Fix the WAL-reset database corruption bug:
https://sqlite.org/wal.html#walresetbug
* Other minor bug fixes.
Update to version 3.51.2:
* Fix an obscure deadlock in the new broken-posix-lock detection
logic.
* Fix multiple problems in the EXISTS-to-JOIN optimization.
Update to version 3.51.1:
* Fix incorrect results from nested EXISTS queries caused by the
optimization in item 6b in the 3.51.0 release.
* Fix a latent bug in fts5vocab virtual table, exposed by new
optimizations in the 3.51.0 release
Update to version 3.51.0:
* New macros in sqlite3.h:
- SQLITE_SCM_BRANCH -> the name of the branch from which the
source code is taken.
- SQLITE_SCM_TAGS -> space-separated list of tags on the source
code check-in.
- SQLITE_SCM_DATETIME -> ISO-8601 date and time of the source
* Two new JSON functions, jsonb_each() and jsonb_tree() work the
same as the existing json_each() and json_tree() functions
except that they return JSONB for the "value" column when the
"type" is 'array' or 'object'.
* The carray and percentile extensions are now built into the
amalgamation, though they are disabled by default and must be
activated at compile-time using the -DSQLITE_ENABLE_CARRAY
and/or -DSQLITE_ENABLE_PERCENTILE options, respectively.
* Enhancements to TCL Interface:
- Add the -asdict flag to the eval command to have it set the
row data as a dict instead of an array.
- User-defined functions may now break to return an SQL NULL.
* CLI enhancements:
- Increase the precision of ".timer" to microseconds.
- Enhance the "box" and "column" formatting modes to deal with
double-wide characters.
- The ".imposter" command provides read-only imposter tables
that work with VACUUM and do not require the --unsafe-testing
option.
- Add the --ifexists option to the CLI command-line option and
to the .open command.
- Limit columns widths set by the ".width" command to 30,000 or
less, as there is not good reason to have wider columns, but
supporting wider columns provides opportunity to malefactors.
* Performance enhancements:
- Use fewer CPU cycles to commit a read transaction.
- Early detection of joins that return no rows due to one or
more of the tables containing no rows.
- Avoid evaluation of scalar subqueries if the result of the
subquery does not change the result of the overall expression.
- Faster window function queries when using
"BETWEEN :x FOLLOWING AND :y FOLLOWING" with a large :y.
* Add the PRAGMA wal_checkpoint=NOOP; command and the
SQLITE_CHECKPOINT_NOOP argument for sqlite3_wal_checkpoint_v2().
* Add the sqlite3_set_errmsg() API for use by extensions.
* Add the sqlite3_db_status64() API, which works just like the
existing sqlite3_db_status() API except that it returns 64-bit
results.
* Add the SQLITE_DBSTATUS_TEMPBUF_SPILL option to the
sqlite3_db_status() and sqlite3_db_status64() interfaces.
* In the session extension add the sqlite3changeset_apply_v3()
interface.
* For the built-in printf() and the format() SQL function, omit
the leading '-' from negative floating point numbers if the '+'
flag is omitted and the "#" flag is present and all displayed
digits are '0'. Use '%#f' or similar to avoid outputs like
'-0.00' and instead show just '0.00'.
* Improved error messages generated by FTS5.
* Enforce STRICT typing on computed columns.
* Improved support for VxWorks
* JavaScript/WASM now supports 64-bit WASM. The canonical builds
continue to be 32-bit but creating one's own 64-bit build is
now as simple as running "make".
Patchnames: SUSE-SLE-Micro-6.1-455
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for sqlite3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for sqlite3 fixes the following issues:\n\nUpdate to sqlite3 3.51.3:\n\n- CVE-2025-7709: Integer Overflow in FTS5 Extension (bsc#1254670).\n- CVE-2025-70873: SQLite zipfile extension may disclose uninitialized heap memory during inflation (bsc#1259619).\n\nChangelog:\n\nUpdate to version 3.51.3:\n\n * Fix the WAL-reset database corruption bug:\n https://sqlite.org/wal.html#walresetbug\n * Other minor bug fixes.\n \nUpdate to version 3.51.2:\n \n * Fix an obscure deadlock in the new broken-posix-lock detection\n logic.\n * Fix multiple problems in the EXISTS-to-JOIN optimization.\n \nUpdate to version 3.51.1:\n\n * Fix incorrect results from nested EXISTS queries caused by the\n optimization in item 6b in the 3.51.0 release.\n * Fix a latent bug in fts5vocab virtual table, exposed by new\n optimizations in the 3.51.0 release\n \nUpdate to version 3.51.0:\n * New macros in sqlite3.h:\n - SQLITE_SCM_BRANCH -\u003e the name of the branch from which the\n source code is taken.\n - SQLITE_SCM_TAGS -\u003e space-separated list of tags on the source\n code check-in.\n - SQLITE_SCM_DATETIME -\u003e ISO-8601 date and time of the source\n * Two new JSON functions, jsonb_each() and jsonb_tree() work the\n same as the existing json_each() and json_tree() functions\n except that they return JSONB for the \"value\" column when the\n \"type\" is \u0027array\u0027 or \u0027object\u0027.\n * The carray and percentile extensions are now built into the\n amalgamation, though they are disabled by default and must be\n activated at compile-time using the -DSQLITE_ENABLE_CARRAY\n and/or -DSQLITE_ENABLE_PERCENTILE options, respectively.\n * Enhancements to TCL Interface:\n - Add the -asdict flag to the eval command to have it set the\n row data as a dict instead of an array.\n - User-defined functions may now break to return an SQL NULL.\n * CLI enhancements:\n - Increase the precision of \".timer\" to microseconds.\n - Enhance the \"box\" and \"column\" formatting modes to deal with\n double-wide characters.\n - The \".imposter\" command provides read-only imposter tables\n that work with VACUUM and do not require the --unsafe-testing\n option.\n - Add the --ifexists option to the CLI command-line option and\n to the .open command.\n - Limit columns widths set by the \".width\" command to 30,000 or\n less, as there is not good reason to have wider columns, but\n supporting wider columns provides opportunity to malefactors.\n * Performance enhancements:\n - Use fewer CPU cycles to commit a read transaction.\n - Early detection of joins that return no rows due to one or\n more of the tables containing no rows.\n - Avoid evaluation of scalar subqueries if the result of the\n subquery does not change the result of the overall expression.\n - Faster window function queries when using\n \"BETWEEN :x FOLLOWING AND :y FOLLOWING\" with a large :y.\n * Add the PRAGMA wal_checkpoint=NOOP; command and the\n SQLITE_CHECKPOINT_NOOP argument for sqlite3_wal_checkpoint_v2().\n * Add the sqlite3_set_errmsg() API for use by extensions.\n * Add the sqlite3_db_status64() API, which works just like the\n existing sqlite3_db_status() API except that it returns 64-bit\n results.\n * Add the SQLITE_DBSTATUS_TEMPBUF_SPILL option to the\n sqlite3_db_status() and sqlite3_db_status64() interfaces.\n * In the session extension add the sqlite3changeset_apply_v3()\n interface.\n * For the built-in printf() and the format() SQL function, omit\n the leading \u0027-\u0027 from negative floating point numbers if the \u0027+\u0027\n flag is omitted and the \"#\" flag is present and all displayed\n digits are \u00270\u0027. Use \u0027%#f\u0027 or similar to avoid outputs like\n \u0027-0.00\u0027 and instead show just \u00270.00\u0027.\n * Improved error messages generated by FTS5.\n * Enforce STRICT typing on computed columns.\n * Improved support for VxWorks\n * JavaScript/WASM now supports 64-bit WASM. The canonical builds\n continue to be 32-bit but creating one\u0027s own 64-bit build is\n now as simple as running \"make\".\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-455",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20771-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20771-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620771-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20771-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024863.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254670",
"url": "https://bugzilla.suse.com/1254670"
},
{
"category": "self",
"summary": "SUSE Bug 1259619",
"url": "https://bugzilla.suse.com/1259619"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-70873 page",
"url": "https://www.suse.com/security/cve/CVE-2025-70873/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-7709 page",
"url": "https://www.suse.com/security/cve/CVE-2025-7709/"
}
],
"title": "Security update for sqlite3",
"tracking": {
"current_release_date": "2026-03-23T09:46:42Z",
"generator": {
"date": "2026-03-23T09:46:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20771-1",
"initial_release_date": "2026-03-23T09:46:42Z",
"revision_history": [
{
"date": "2026-03-23T09:46:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64",
"product": {
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64",
"product_id": "libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le",
"product": {
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le",
"product_id": "libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x",
"product": {
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x",
"product_id": "libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64",
"product": {
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64",
"product_id": "libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64"
},
"product_reference": "libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le"
},
"product_reference": "libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x"
},
"product_reference": "libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-70873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-70873"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-70873",
"url": "https://www.suse.com/security/cve/CVE-2025-70873"
},
{
"category": "external",
"summary": "SUSE Bug 1259619 for CVE-2025-70873",
"url": "https://bugzilla.suse.com/1259619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:46:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-70873"
},
{
"cve": "CVE-2025-7709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-7709"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow exists in the FTS5 https://sqlite.org/fts5.html extension. It occurs when the size of an array of tombstone pointers is calculated and truncated into a 32-bit integer. A pointer to partially controlled data can then be written out of bounds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-7709",
"url": "https://www.suse.com/security/cve/CVE-2025-7709"
},
{
"category": "external",
"summary": "SUSE Bug 1254670 for CVE-2025-7709",
"url": "https://bugzilla.suse.com/1254670"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:libsqlite3-0-3.51.3-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-23T09:46:42Z",
"details": "moderate"
}
],
"title": "CVE-2025-7709"
}
]
}
CERTFR-2026-AVI-0369
Vulnerability from certfr_avis - Published: 2026-03-27 - Updated: 2026-03-27
De multiples vulnérabilités ont été découvertes dans le noyau Linux de SUSE. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SUSE | Public Cloud Module | Public Cloud Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP6 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 12 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing 15 SP4 | ||
| SUSE | SUSE Manager Retail Branch Server | SUSE Manager Retail Branch Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 12-SP5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.4 | ||
| SUSE | SUSE Linux Enterprise Desktop | SUSE Linux Enterprise Desktop 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP6 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 12 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 LTSS | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.4 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP5 | ||
| SUSE | SUSE Linux Enterprise High Performance Computing | SUSE Linux Enterprise High Performance Computing LTSS 15 SP5 | ||
| SUSE | openSUSE Leap | openSUSE Leap 15.6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.3 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP5 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Workstation Extension | SUSE Linux Enterprise Workstation Extension 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP4 | ||
| SUSE | SUSE Manager Proxy | SUSE Manager Proxy 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro for Rancher 5.2 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server for SAP Applications 15 SP4 | ||
| SUSE | Basesystem Module | Basesystem Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.5 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP4 | ||
| SUSE | SUSE Linux Enterprise Real Time | SUSE Linux Enterprise Real Time 15 SP6 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.1 | ||
| SUSE | Legacy Module | Legacy Module 15-SP7 | ||
| SUSE | SUSE Linux Micro | SUSE Linux Micro 6.0 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP7 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP5 LTSS | ||
| SUSE | SUSE Manager Server | SUSE Manager Server 4.3 | ||
| SUSE | SUSE Linux Enterprise Server | SUSE Linux Enterprise Server 15 SP6 LTSS | ||
| SUSE | SUSE Real Time Module | SUSE Real Time Module 15-SP7 | ||
| SUSE | Development Tools Module | Development Tools Module 15-SP7 | ||
| SUSE | SUSE Linux Enterprise High Availability Extension | SUSE Linux Enterprise High Availability Extension 15 SP6 | ||
| SUSE | SUSE Linux Enterprise Micro | SUSE Linux Enterprise Micro 5.4 | ||
| SUSE | SUSE Linux Enterprise Live Patching | SUSE Linux Enterprise Live Patching 15-SP4 | ||
| SUSE | SUSE Linux Micro Extras | SUSE Linux Micro Extras 6.0 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Public Cloud Module 15-SP7",
"product": {
"name": "Public Cloud Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 12 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Retail Branch Server 4.3",
"product": {
"name": "SUSE Manager Retail Branch Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 12-SP5",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Desktop 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Desktop",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP6",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP7",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Performance Computing LTSS 15 SP5",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Workstation Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro for Rancher 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Basesystem Module 15-SP7",
"product": {
"name": "Basesystem Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP7",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Real Time 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Real Time",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Legacy Module 15-SP7",
"product": {
"name": "Legacy Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP5 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Server 15 SP6 LTSS",
"product": {
"name": "SUSE Linux Enterprise Server",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Real Time Module 15-SP7",
"product": {
"name": "SUSE Real Time Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "Development Tools Module 15-SP7",
"product": {
"name": "Development Tools Module",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise High Availability Extension 15 SP6",
"product": {
"name": "SUSE Linux Enterprise High Availability Extension",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Enterprise Live Patching 15-SP4",
"product": {
"name": "SUSE Linux Enterprise Live Patching",
"vendor": {
"name": "SUSE",
"scada": false
}
}
},
{
"description": "SUSE Linux Micro Extras 6.0",
"product": {
"name": "SUSE Linux Micro Extras",
"vendor": {
"name": "SUSE",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-68234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68234"
},
{
"name": "CVE-2025-71075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71075"
},
{
"name": "CVE-2023-54076",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54076"
},
{
"name": "CVE-2026-23198",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23198"
},
{
"name": "CVE-2025-40273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40273"
},
{
"name": "CVE-2023-53714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53714"
},
{
"name": "CVE-2025-68230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68230"
},
{
"name": "CVE-2026-23202",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23202"
},
{
"name": "CVE-2023-54149",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54149"
},
{
"name": "CVE-2025-71086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71086"
},
{
"name": "CVE-2023-53797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53797"
},
{
"name": "CVE-2023-53863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53863"
},
{
"name": "CVE-2026-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23167"
},
{
"name": "CVE-2025-22083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22083"
},
{
"name": "CVE-2023-54142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54142"
},
{
"name": "CVE-2025-68374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68374"
},
{
"name": "CVE-2026-23129",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23129"
},
{
"name": "CVE-2023-54000",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54000"
},
{
"name": "CVE-2023-54052",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54052"
},
{
"name": "CVE-2025-68286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68286"
},
{
"name": "CVE-2025-71094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71094"
},
{
"name": "CVE-2025-68788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68788"
},
{
"name": "CVE-2023-54091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54091"
},
{
"name": "CVE-2023-54083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54083"
},
{
"name": "CVE-2025-40314",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40314"
},
{
"name": "CVE-2025-40306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40306"
},
{
"name": "CVE-2025-68778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68778"
},
{
"name": "CVE-2023-53821",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53821"
},
{
"name": "CVE-2023-53799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53799"
},
{
"name": "CVE-2026-23054",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23054"
},
{
"name": "CVE-2025-40254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40254"
},
{
"name": "CVE-2025-71064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71064"
},
{
"name": "CVE-2023-54201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54201"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-68200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68200"
},
{
"name": "CVE-2025-68736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68736"
},
{
"name": "CVE-2025-68725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68725"
},
{
"name": "CVE-2025-68176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68176"
},
{
"name": "CVE-2025-68204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68204"
},
{
"name": "CVE-2025-68795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68795"
},
{
"name": "CVE-2025-68349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68349"
},
{
"name": "CVE-2025-68380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68380"
},
{
"name": "CVE-2026-23269",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23269"
},
{
"name": "CVE-2023-54309",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54309"
},
{
"name": "CVE-2025-68283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68283"
},
{
"name": "CVE-2025-68339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68339"
},
{
"name": "CVE-2025-40287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40287"
},
{
"name": "CVE-2026-23069",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23069"
},
{
"name": "CVE-2023-53995",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53995"
},
{
"name": "CVE-2026-22992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22992"
},
{
"name": "CVE-2023-54255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54255"
},
{
"name": "CVE-2026-23004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23004"
},
{
"name": "CVE-2025-71071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71071"
},
{
"name": "CVE-2023-54271",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54271"
},
{
"name": "CVE-2025-71191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71191"
},
{
"name": "CVE-2025-68295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68295"
},
{
"name": "CVE-2025-68728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68728"
},
{
"name": "CVE-2025-71087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71087"
},
{
"name": "CVE-2023-54297",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54297"
},
{
"name": "CVE-2023-54112",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54112"
},
{
"name": "CVE-2025-68287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68287"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-71135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71135"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2023-54313",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54313"
},
{
"name": "CVE-2023-53759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53759"
},
{
"name": "CVE-2025-68746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68746"
},
{
"name": "CVE-2025-68773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68773"
},
{
"name": "CVE-2025-71133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71133"
},
{
"name": "CVE-2023-53994",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53994"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40103"
},
{
"name": "CVE-2025-40312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40312"
},
{
"name": "CVE-2023-54095",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54095"
},
{
"name": "CVE-2025-22125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22125"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2023-54143",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54143"
},
{
"name": "CVE-2025-68238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68238"
},
{
"name": "CVE-2025-68297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68297"
},
{
"name": "CVE-2023-53813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53813"
},
{
"name": "CVE-2023-54227",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54227"
},
{
"name": "CVE-2026-23139",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23139"
},
{
"name": "CVE-2023-53855",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53855"
},
{
"name": "CVE-2026-23208",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23208"
},
{
"name": "CVE-2025-68804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68804"
},
{
"name": "CVE-2026-23017",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23017"
},
{
"name": "CVE-2023-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53864"
},
{
"name": "CVE-2025-40350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40350"
},
{
"name": "CVE-2025-40309",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40309"
},
{
"name": "CVE-2025-71189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71189"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2023-54246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54246"
},
{
"name": "CVE-2025-71088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71088"
},
{
"name": "CVE-2026-23179",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23179"
},
{
"name": "CVE-2025-38243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38243"
},
{
"name": "CVE-2025-40343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40343"
},
{
"name": "CVE-2023-54001",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54001"
},
{
"name": "CVE-2026-23090",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23090"
},
{
"name": "CVE-2026-23035",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23035"
},
{
"name": "CVE-2023-54253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54253"
},
{
"name": "CVE-2026-23210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23210"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-68307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68307"
},
{
"name": "CVE-2025-40308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40308"
},
{
"name": "CVE-2023-54324",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54324"
},
{
"name": "CVE-2023-54106",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54106"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-40315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40315"
},
{
"name": "CVE-2023-53793",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53793"
},
{
"name": "CVE-2023-54096",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54096"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2026-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23064"
},
{
"name": "CVE-2025-71098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71098"
},
{
"name": "CVE-2025-40251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40251"
},
{
"name": "CVE-2025-71078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71078"
},
{
"name": "CVE-2025-40355",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40355"
},
{
"name": "CVE-2023-54283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54283"
},
{
"name": "CVE-2023-54049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54049"
},
{
"name": "CVE-2025-71083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71083"
},
{
"name": "CVE-2023-54066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54066"
},
{
"name": "CVE-2026-23061",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23061"
},
{
"name": "CVE-2023-54117",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54117"
},
{
"name": "CVE-2023-53999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53999"
},
{
"name": "CVE-2023-54038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54038"
},
{
"name": "CVE-2025-68813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68813"
},
{
"name": "CVE-2023-54315",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54315"
},
{
"name": "CVE-2026-23135",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23135"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-68365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68365"
},
{
"name": "CVE-2023-54211",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54211"
},
{
"name": "CVE-2023-54251",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54251"
},
{
"name": "CVE-2026-23119",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23119"
},
{
"name": "CVE-2025-71085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71085"
},
{
"name": "CVE-2023-54156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54156"
},
{
"name": "CVE-2026-23173",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23173"
},
{
"name": "CVE-2026-23268",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23268"
},
{
"name": "CVE-2023-53750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53750"
},
{
"name": "CVE-2025-40347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40347"
},
{
"name": "CVE-2025-71154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71154"
},
{
"name": "CVE-2023-54037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54037"
},
{
"name": "CVE-2023-53815",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53815"
},
{
"name": "CVE-2026-23222",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23222"
},
{
"name": "CVE-2025-68257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68257"
},
{
"name": "CVE-2025-71084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71084"
},
{
"name": "CVE-2023-54031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54031"
},
{
"name": "CVE-2026-23094",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23094"
},
{
"name": "CVE-2026-23049",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23049"
},
{
"name": "CVE-2025-40190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40190"
},
{
"name": "CVE-2022-50756",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50756"
},
{
"name": "CVE-2023-53989",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53989"
},
{
"name": "CVE-2025-68347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68347"
},
{
"name": "CVE-2025-68235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68235"
},
{
"name": "CVE-2025-68770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68770"
},
{
"name": "CVE-2026-23229",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23229"
},
{
"name": "CVE-2025-40202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40202"
},
{
"name": "CVE-2025-40311",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40311"
},
{
"name": "CVE-2025-68814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68814"
},
{
"name": "CVE-2023-54254",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54254"
},
{
"name": "CVE-2025-71081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71081"
},
{
"name": "CVE-2023-54312",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54312"
},
{
"name": "CVE-2023-54094",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54094"
},
{
"name": "CVE-2026-23101",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23101"
},
{
"name": "CVE-2026-23099",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23099"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2023-53846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53846"
},
{
"name": "CVE-2023-53792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53792"
},
{
"name": "CVE-2023-54164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54164"
},
{
"name": "CVE-2025-40256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40256"
},
{
"name": "CVE-2026-22989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22989"
},
{
"name": "CVE-2026-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23085"
},
{
"name": "CVE-2025-40360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40360"
},
{
"name": "CVE-2026-23209",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23209"
},
{
"name": "CVE-2025-71136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71136"
},
{
"name": "CVE-2025-68354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68354"
},
{
"name": "CVE-2025-68801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68801"
},
{
"name": "CVE-2026-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23150"
},
{
"name": "CVE-2023-54316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54316"
},
{
"name": "CVE-2025-40097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40097"
},
{
"name": "CVE-2025-68258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68258"
},
{
"name": "CVE-2023-54089",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54089"
},
{
"name": "CVE-2026-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23163"
},
{
"name": "CVE-2023-54016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54016"
},
{
"name": "CVE-2025-71235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71235"
},
{
"name": "CVE-2023-54035",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54035"
},
{
"name": "CVE-2025-40322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40322"
},
{
"name": "CVE-2026-23057",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23057"
},
{
"name": "CVE-2025-68209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68209"
},
{
"name": "CVE-2025-71138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71138"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-54322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54322"
},
{
"name": "CVE-2023-54155",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54155"
},
{
"name": "CVE-2023-54088",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54088"
},
{
"name": "CVE-2026-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23166"
},
{
"name": "CVE-2025-40271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40271"
},
{
"name": "CVE-2023-54276",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54276"
},
{
"name": "CVE-2023-42752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42752"
},
{
"name": "CVE-2026-22991",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22991"
},
{
"name": "CVE-2023-54048",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54048"
},
{
"name": "CVE-2023-54278",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54278"
},
{
"name": "CVE-2023-54215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54215"
},
{
"name": "CVE-2025-68308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68308"
},
{
"name": "CVE-2023-53777",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53777"
},
{
"name": "CVE-2023-54133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54133"
},
{
"name": "CVE-2025-40242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40242"
},
{
"name": "CVE-2026-23116",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23116"
},
{
"name": "CVE-2023-54148",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54148"
},
{
"name": "CVE-2025-68190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68190"
},
{
"name": "CVE-2023-54064",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54064"
},
{
"name": "CVE-2023-54153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54153"
},
{
"name": "CVE-2026-23207",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23207"
},
{
"name": "CVE-2025-40252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40252"
},
{
"name": "CVE-2025-71200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71200"
},
{
"name": "CVE-2023-53791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53791"
},
{
"name": "CVE-2025-68218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68218"
},
{
"name": "CVE-2023-53848",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53848"
},
{
"name": "CVE-2025-68255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68255"
},
{
"name": "CVE-2023-54081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54081"
},
{
"name": "CVE-2023-53828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53828"
},
{
"name": "CVE-2025-40024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40024"
},
{
"name": "CVE-2026-23172",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23172"
},
{
"name": "CVE-2025-40238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40238"
},
{
"name": "CVE-2023-54185",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54185"
},
{
"name": "CVE-2025-40277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40277"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2025-68174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68174"
},
{
"name": "CVE-2025-40272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40272"
},
{
"name": "CVE-2026-23133",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23133"
},
{
"name": "CVE-2025-71093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71093"
},
{
"name": "CVE-2026-23131",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23131"
},
{
"name": "CVE-2026-23170",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23170"
},
{
"name": "CVE-2025-68759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68759"
},
{
"name": "CVE-2023-53834",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53834"
},
{
"name": "CVE-2026-23204",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23204"
},
{
"name": "CVE-2025-71188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71188"
},
{
"name": "CVE-2025-40345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40345"
},
{
"name": "CVE-2023-54170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54170"
},
{
"name": "CVE-2026-23125",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23125"
},
{
"name": "CVE-2023-53781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53781"
},
{
"name": "CVE-2025-40033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40033"
},
{
"name": "CVE-2022-50453",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50453"
},
{
"name": "CVE-2024-42103",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42103"
},
{
"name": "CVE-2025-68733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68733"
},
{
"name": "CVE-2026-23005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23005"
},
{
"name": "CVE-2026-23214",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23214"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-68188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68188"
},
{
"name": "CVE-2025-40269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40269"
},
{
"name": "CVE-2025-68335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68335"
},
{
"name": "CVE-2025-71079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71079"
},
{
"name": "CVE-2023-54223",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54223"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2026-23178",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23178"
},
{
"name": "CVE-2026-22997",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22997"
},
{
"name": "CVE-2025-39977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39977"
},
{
"name": "CVE-2023-54045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54045"
},
{
"name": "CVE-2025-68330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68330"
},
{
"name": "CVE-2023-54101",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54101"
},
{
"name": "CVE-2025-71196",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71196"
},
{
"name": "CVE-2023-54179",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54179"
},
{
"name": "CVE-2025-68180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68180"
},
{
"name": "CVE-2023-54289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54289"
},
{
"name": "CVE-2023-54177",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54177"
},
{
"name": "CVE-2026-23191",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23191"
},
{
"name": "CVE-2026-23078",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23078"
},
{
"name": "CVE-2025-68201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68201"
},
{
"name": "CVE-2025-40289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40289"
},
{
"name": "CVE-2026-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23169"
},
{
"name": "CVE-2025-68768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68768"
},
{
"name": "CVE-2025-68785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68785"
},
{
"name": "CVE-2025-71130",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71130"
},
{
"name": "CVE-2023-54013",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54013"
},
{
"name": "CVE-2025-68808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68808"
},
{
"name": "CVE-2024-27005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27005"
},
{
"name": "CVE-2025-68223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68223"
},
{
"name": "CVE-2025-68783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68783"
},
{
"name": "CVE-2025-40292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40292"
},
{
"name": "CVE-2025-71147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71147"
},
{
"name": "CVE-2023-54093",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54093"
},
{
"name": "CVE-2023-53839",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53839"
},
{
"name": "CVE-2023-53752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53752"
},
{
"name": "CVE-2023-53802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53802"
},
{
"name": "CVE-2025-38224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38224"
},
{
"name": "CVE-2025-68724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68724"
},
{
"name": "CVE-2023-54318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54318"
},
{
"name": "CVE-2026-23074",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23074"
},
{
"name": "CVE-2025-71126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71126"
},
{
"name": "CVE-2025-71199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71199"
},
{
"name": "CVE-2025-68252",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68252"
},
{
"name": "CVE-2023-54166",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54166"
},
{
"name": "CVE-2025-40274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40274"
},
{
"name": "CVE-2025-68797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68797"
},
{
"name": "CVE-2023-54136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54136"
},
{
"name": "CVE-2023-54225",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54225"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-68237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68237"
},
{
"name": "CVE-2023-54194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54194"
},
{
"name": "CVE-2025-40257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40257"
},
{
"name": "CVE-2025-68259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68259"
},
{
"name": "CVE-2025-71125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71125"
},
{
"name": "CVE-2026-23006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23006"
},
{
"name": "CVE-2025-71108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71108"
},
{
"name": "CVE-2025-68789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68789"
},
{
"name": "CVE-2025-68312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68312"
},
{
"name": "CVE-2023-53843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53843"
},
{
"name": "CVE-2025-68284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68284"
},
{
"name": "CVE-2025-68194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68194"
},
{
"name": "CVE-2025-38379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38379"
},
{
"name": "CVE-2025-71195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71195"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2026-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23083"
},
{
"name": "CVE-2026-23088",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23088"
},
{
"name": "CVE-2023-53844",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53844"
},
{
"name": "CVE-2025-68183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68183"
},
{
"name": "CVE-2025-40263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40263"
},
{
"name": "CVE-2023-54026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54026"
},
{
"name": "CVE-2026-23108",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23108"
},
{
"name": "CVE-2025-68244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68244"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-40278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40278"
},
{
"name": "CVE-2025-71194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71194"
},
{
"name": "CVE-2025-40342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40342"
},
{
"name": "CVE-2026-23023",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23023"
},
{
"name": "CVE-2023-53858",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53858"
},
{
"name": "CVE-2023-53992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53992"
},
{
"name": "CVE-2026-22999",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22999"
},
{
"name": "CVE-2023-54266",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54266"
},
{
"name": "CVE-2025-71082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71082"
},
{
"name": "CVE-2025-68222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68222"
},
{
"name": "CVE-2026-23068",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23068"
},
{
"name": "CVE-2025-68765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68765"
},
{
"name": "CVE-2023-53825",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53825"
},
{
"name": "CVE-2026-23089",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23089"
},
{
"name": "CVE-2025-71132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71132"
},
{
"name": "CVE-2025-71225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71225"
},
{
"name": "CVE-2023-54072",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54072"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2026-23071",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23071"
},
{
"name": "CVE-2023-54134",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54134"
},
{
"name": "CVE-2026-23056",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23056"
},
{
"name": "CVE-2023-54184",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54184"
},
{
"name": "CVE-2025-71077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71077"
},
{
"name": "CVE-2023-54291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54291"
},
{
"name": "CVE-2025-40279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40279"
},
{
"name": "CVE-2023-53865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53865"
},
{
"name": "CVE-2025-68328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68328"
},
{
"name": "CVE-2025-40201",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40201"
},
{
"name": "CVE-2026-23063",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23063"
},
{
"name": "CVE-2023-53823",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53823"
},
{
"name": "CVE-2026-23073",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23073"
},
{
"name": "CVE-2023-54023",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54023"
},
{
"name": "CVE-2025-71114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71114"
},
{
"name": "CVE-2026-23058",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23058"
},
{
"name": "CVE-2025-68744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68744"
},
{
"name": "CVE-2025-71182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71182"
},
{
"name": "CVE-2023-54241",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54241"
},
{
"name": "CVE-2025-68320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68320"
},
{
"name": "CVE-2026-23038",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23038"
},
{
"name": "CVE-2023-54017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54017"
},
{
"name": "CVE-2023-53257",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53257"
},
{
"name": "CVE-2026-22990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22990"
},
{
"name": "CVE-2023-53787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53787"
},
{
"name": "CVE-2026-23000",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23000"
},
{
"name": "CVE-2025-68172",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68172"
},
{
"name": "CVE-2026-23176",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23176"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2024-53149",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53149"
},
{
"name": "CVE-2025-40338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40338"
},
{
"name": "CVE-2026-23026",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23026"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2026-23128",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23128"
},
{
"name": "CVE-2025-68325",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68325"
},
{
"name": "CVE-2025-71190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71190"
},
{
"name": "CVE-2023-54154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54154"
},
{
"name": "CVE-2025-71089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71089"
},
{
"name": "CVE-2023-54141",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54141"
},
{
"name": "CVE-2023-53766",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53766"
},
{
"name": "CVE-2026-23107",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23107"
},
{
"name": "CVE-2025-68296",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68296"
},
{
"name": "CVE-2023-53785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53785"
},
{
"name": "CVE-2025-40328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40328"
},
{
"name": "CVE-2025-68332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68332"
},
{
"name": "CVE-2023-54263",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54263"
},
{
"name": "CVE-2025-71104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71104"
},
{
"name": "CVE-2026-22978",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22978"
},
{
"name": "CVE-2025-40283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40283"
},
{
"name": "CVE-2025-40324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40324"
},
{
"name": "CVE-2023-54181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54181"
},
{
"name": "CVE-2025-68378",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68378"
},
{
"name": "CVE-2026-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23146"
},
{
"name": "CVE-2023-53795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53795"
},
{
"name": "CVE-2026-23037",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23037"
},
{
"name": "CVE-2025-40250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40250"
},
{
"name": "CVE-2025-40264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40264"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2026-23001",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23001"
},
{
"name": "CVE-2025-68367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68367"
},
{
"name": "CVE-2025-71224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71224"
},
{
"name": "CVE-2025-68820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68820"
},
{
"name": "CVE-2025-40321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40321"
},
{
"name": "CVE-2023-54207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54207"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2025-68740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68740"
},
{
"name": "CVE-2025-40158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40158"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-68742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68742"
},
{
"name": "CVE-2025-40282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40282"
},
{
"name": "CVE-2023-53819",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53819"
},
{
"name": "CVE-2023-54210",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54210"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2023-54030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54030"
},
{
"name": "CVE-2025-68816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68816"
},
{
"name": "CVE-2025-68192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68192"
},
{
"name": "CVE-2023-54092",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54092"
},
{
"name": "CVE-2025-68379",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68379"
},
{
"name": "CVE-2023-53997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53997"
},
{
"name": "CVE-2025-68256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68256"
},
{
"name": "CVE-2025-68777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68777"
},
{
"name": "CVE-2025-68254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68254"
},
{
"name": "CVE-2026-23221",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23221"
},
{
"name": "CVE-2026-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23151"
},
{
"name": "CVE-2025-71145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71145"
},
{
"name": "CVE-2025-68171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68171"
},
{
"name": "CVE-2026-23152",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23152"
},
{
"name": "CVE-2025-40301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40301"
},
{
"name": "CVE-2025-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22047"
},
{
"name": "CVE-2026-22982",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22982"
},
{
"name": "CVE-2023-54224",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54224"
},
{
"name": "CVE-2023-54235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54235"
},
{
"name": "CVE-2025-71222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71222"
},
{
"name": "CVE-2025-71118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71118"
},
{
"name": "CVE-2023-54032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54032"
},
{
"name": "CVE-2025-68327",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68327"
},
{
"name": "CVE-2023-6040",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6040"
},
{
"name": "CVE-2023-53856",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53856"
},
{
"name": "CVE-2025-40318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40318"
},
{
"name": "CVE-2025-71229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71229"
},
{
"name": "CVE-2026-23213",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23213"
},
{
"name": "CVE-2026-23091",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23091"
},
{
"name": "CVE-2025-68241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68241"
},
{
"name": "CVE-2023-53817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53817"
},
{
"name": "CVE-2023-53782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53782"
},
{
"name": "CVE-2023-54115",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54115"
},
{
"name": "CVE-2023-54069",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54069"
},
{
"name": "CVE-2025-71192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71192"
},
{
"name": "CVE-2023-54104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54104"
},
{
"name": "CVE-2025-40135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40135"
},
{
"name": "CVE-2026-23121",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23121"
},
{
"name": "CVE-2023-54027",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54027"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-68734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68734"
},
{
"name": "CVE-2025-68776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68776"
},
{
"name": "CVE-2025-71066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71066"
},
{
"name": "CVE-2026-22993",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22993"
},
{
"name": "CVE-2025-71236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71236"
},
{
"name": "CVE-2023-53851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53851"
},
{
"name": "CVE-2025-68345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68345"
},
{
"name": "CVE-2025-71097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71097"
},
{
"name": "CVE-2023-54183",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54183"
},
{
"name": "CVE-2023-53841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53841"
},
{
"name": "CVE-2023-54326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54326"
},
{
"name": "CVE-2023-54267",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54267"
},
{
"name": "CVE-2023-54282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54282"
},
{
"name": "CVE-2025-71234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71234"
},
{
"name": "CVE-2025-40310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40310"
},
{
"name": "CVE-2022-50697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50697"
},
{
"name": "CVE-2025-70873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-70873"
},
{
"name": "CVE-2025-71111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71111"
},
{
"name": "CVE-2026-22985",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22985"
},
{
"name": "CVE-2023-54006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54006"
},
{
"name": "CVE-2023-53784",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53784"
},
{
"name": "CVE-2023-54067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54067"
},
{
"name": "CVE-2023-54264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54264"
},
{
"name": "CVE-2025-71185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71185"
},
{
"name": "CVE-2025-40331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40331"
},
{
"name": "CVE-2026-23096",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23096"
},
{
"name": "CVE-2025-68337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68337"
},
{
"name": "CVE-2025-68351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68351"
},
{
"name": "CVE-2023-54304",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54304"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-71131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71131"
},
{
"name": "CVE-2023-54125",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54125"
},
{
"name": "CVE-2023-54173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54173"
},
{
"name": "CVE-2023-53743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53743"
},
{
"name": "CVE-2025-71116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71116"
},
{
"name": "CVE-2023-53842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53842"
},
{
"name": "CVE-2025-68208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68208"
},
{
"name": "CVE-2025-68362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68362"
},
{
"name": "CVE-2025-71232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71232"
},
{
"name": "CVE-2023-53762",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53762"
},
{
"name": "CVE-2025-68290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68290"
},
{
"name": "CVE-2025-40280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40280"
},
{
"name": "CVE-2025-40099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40099"
},
{
"name": "CVE-2025-71162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71162"
},
{
"name": "CVE-2025-40293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40293"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2023-54127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54127"
},
{
"name": "CVE-2023-53861",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53861"
},
{
"name": "CVE-2025-68803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68803"
},
{
"name": "CVE-2026-22996",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22996"
},
{
"name": "CVE-2025-68331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68331"
},
{
"name": "CVE-2023-54137",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54137"
},
{
"name": "CVE-2026-23105",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23105"
},
{
"name": "CVE-2026-22976",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22976"
},
{
"name": "CVE-2023-54319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54319"
},
{
"name": "CVE-2025-68305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68305"
},
{
"name": "CVE-2025-40320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40320"
},
{
"name": "CVE-2026-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23141"
},
{
"name": "CVE-2026-23065",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23065"
},
{
"name": "CVE-2025-68753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68753"
},
{
"name": "CVE-2023-54140",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54140"
},
{
"name": "CVE-2025-68775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68775"
},
{
"name": "CVE-2026-23182",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23182"
},
{
"name": "CVE-2025-71112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71112"
},
{
"name": "CVE-2023-54285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54285"
},
{
"name": "CVE-2026-23086",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23086"
},
{
"name": "CVE-2023-54025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54025"
},
{
"name": "CVE-2025-40192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40192"
},
{
"name": "CVE-2023-54229",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54229"
},
{
"name": "CVE-2025-68818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68818"
},
{
"name": "CVE-2023-54300",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54300"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2023-54042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54042"
},
{
"name": "CVE-2023-53807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53807"
},
{
"name": "CVE-2025-40102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40102"
},
{
"name": "CVE-2023-54302",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54302"
},
{
"name": "CVE-2025-40170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40170"
},
{
"name": "CVE-2025-40160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40160"
},
{
"name": "CVE-2025-40284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40284"
},
{
"name": "CVE-2023-54178",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54178"
},
{
"name": "CVE-2023-54051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54051"
},
{
"name": "CVE-2023-53808",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53808"
},
{
"name": "CVE-2025-71148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71148"
},
{
"name": "CVE-2025-68366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68366"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2023-54008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54008"
},
{
"name": "CVE-2026-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23156"
},
{
"name": "CVE-2023-54014",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54014"
},
{
"name": "CVE-2025-68815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68815"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40307"
},
{
"name": "CVE-2026-23095",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23095"
},
{
"name": "CVE-2025-68346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68346"
},
{
"name": "CVE-2025-71163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71163"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2026-23062",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23062"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2023-54258",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54258"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-71096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71096"
},
{
"name": "CVE-2025-71095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71095"
},
{
"name": "CVE-2023-54221",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54221"
},
{
"name": "CVE-2025-68771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68771"
},
{
"name": "CVE-2025-68363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68363"
},
{
"name": "CVE-2025-40248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40248"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2026-22984",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22984"
},
{
"name": "CVE-2025-68303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68303"
},
{
"name": "CVE-2025-40259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40259"
},
{
"name": "CVE-2023-53827",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53827"
},
{
"name": "CVE-2025-68757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68757"
},
{
"name": "CVE-2023-54293",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54293"
},
{
"name": "CVE-2025-40329",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40329"
},
{
"name": "CVE-2026-23070",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23070"
},
{
"name": "CVE-2026-23033",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23033"
},
{
"name": "CVE-2026-22977",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22977"
},
{
"name": "CVE-2026-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23145"
},
{
"name": "CVE-2022-50423",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50423"
},
{
"name": "CVE-2023-54060",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54060"
},
{
"name": "CVE-2026-23104",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23104"
},
{
"name": "CVE-2026-23003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23003"
},
{
"name": "CVE-2025-68766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68766"
},
{
"name": "CVE-2023-53778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53778"
},
{
"name": "CVE-2025-39817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39817"
},
{
"name": "CVE-2026-23076",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23076"
},
{
"name": "CVE-2023-54145",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54145"
},
{
"name": "CVE-2023-54171",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54171"
},
{
"name": "CVE-2023-54240",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54240"
},
{
"name": "CVE-2025-68168",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68168"
},
{
"name": "CVE-2025-71123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71123"
},
{
"name": "CVE-2025-68206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68206"
},
{
"name": "CVE-2023-54247",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54247"
},
{
"name": "CVE-2024-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38542"
},
{
"name": "CVE-2025-71100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71100"
},
{
"name": "CVE-2025-68372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68372"
},
{
"name": "CVE-2026-23171",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23171"
},
{
"name": "CVE-2023-54070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54070"
},
{
"name": "CVE-2023-54204",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54204"
},
{
"name": "CVE-2026-23010",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23010"
},
{
"name": "CVE-2026-23112",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23112"
},
{
"name": "CVE-2025-68313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68313"
},
{
"name": "CVE-2023-53850",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53850"
},
{
"name": "CVE-2023-54303",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54303"
},
{
"name": "CVE-2025-71137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71137"
},
{
"name": "CVE-2026-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23084"
},
{
"name": "CVE-2026-23190",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23190"
},
{
"name": "CVE-2025-40123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40123"
},
{
"name": "CVE-2026-22979",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22979"
},
{
"name": "CVE-2023-53998",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53998"
},
{
"name": "CVE-2025-68301",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68301"
},
{
"name": "CVE-2026-23011",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23011"
},
{
"name": "CVE-2023-53816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53816"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2025-68217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68217"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-68289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68289"
},
{
"name": "CVE-2025-40363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40363"
},
{
"name": "CVE-2023-53852",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53852"
},
{
"name": "CVE-2025-40253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40253"
},
{
"name": "CVE-2026-22988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22988"
},
{
"name": "CVE-2025-68245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68245"
},
{
"name": "CVE-2025-40317",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40317"
},
{
"name": "CVE-2026-23110",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23110"
},
{
"name": "CVE-2023-54135",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54135"
},
{
"name": "CVE-2023-53996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53996"
},
{
"name": "CVE-2025-68233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68233"
},
{
"name": "CVE-2025-71120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71120"
},
{
"name": "CVE-2024-26944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26944"
},
{
"name": "CVE-2026-23060",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23060"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2025-40316",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40316"
},
{
"name": "CVE-2025-71119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71119"
},
{
"name": "CVE-2023-54314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54314"
},
{
"name": "CVE-2025-71197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71197"
},
{
"name": "CVE-2025-68758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68758"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2025-71113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71113"
},
{
"name": "CVE-2023-54292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54292"
},
{
"name": "CVE-2026-23102",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23102"
},
{
"name": "CVE-2026-22998",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22998"
},
{
"name": "CVE-2023-54172",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54172"
},
{
"name": "CVE-2023-54113",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54113"
},
{
"name": "CVE-2025-68340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68340"
},
{
"name": "CVE-2026-23082",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23082"
},
{
"name": "CVE-2023-53836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53836"
},
{
"name": "CVE-2026-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23155"
},
{
"name": "CVE-2025-40288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40288"
},
{
"name": "CVE-2025-68239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68239"
},
{
"name": "CVE-2025-40258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40258"
},
{
"name": "CVE-2023-53857",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53857"
},
{
"name": "CVE-2023-53860",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53860"
},
{
"name": "CVE-2025-68185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68185"
},
{
"name": "CVE-2025-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40304"
},
{
"name": "CVE-2023-54169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54169"
},
{
"name": "CVE-2025-40268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40268"
},
{
"name": "CVE-2026-23111",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23111"
},
{
"name": "CVE-2023-54281",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54281"
},
{
"name": "CVE-2026-23113",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23113"
},
{
"name": "CVE-2025-71231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71231"
},
{
"name": "CVE-2023-54080",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54080"
},
{
"name": "CVE-2025-68798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68798"
},
{
"name": "CVE-2023-53794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53794"
},
{
"name": "CVE-2026-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23157"
},
{
"name": "CVE-2025-68810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68810"
},
{
"name": "CVE-2025-68178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68178"
},
{
"name": "CVE-2025-40337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40337"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40262"
},
{
"name": "CVE-2025-39813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39813"
},
{
"name": "CVE-2025-71198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71198"
},
{
"name": "CVE-2025-68819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68819"
},
{
"name": "CVE-2023-54022",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54022"
},
{
"name": "CVE-2025-40261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40261"
},
{
"name": "CVE-2023-54296",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54296"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-68735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68735"
},
{
"name": "CVE-2026-23021",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23021"
},
{
"name": "CVE-2025-68732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68732"
},
{
"name": "CVE-2025-40323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40323"
},
{
"name": "CVE-2025-68285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68285"
},
{
"name": "CVE-2023-54220",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54220"
},
{
"name": "CVE-2025-71183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71183"
},
{
"name": "CVE-2023-54209",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54209"
},
{
"name": "CVE-2025-40275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40275"
},
{
"name": "CVE-2023-54019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54019"
},
{
"name": "CVE-2026-25702",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25702"
},
{
"name": "CVE-2025-39829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39829"
},
{
"name": "CVE-2025-71091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71091"
},
{
"name": "CVE-2026-23053",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23053"
},
{
"name": "CVE-2023-54189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54189"
},
{
"name": "CVE-2025-71184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71184"
},
{
"name": "CVE-2025-68227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68227"
},
{
"name": "CVE-2025-40339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40339"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2023-54230",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54230"
},
{
"name": "CVE-2023-53831",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53831"
},
{
"name": "CVE-2025-68800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68800"
},
{
"name": "CVE-2025-68195",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68195"
},
{
"name": "CVE-2025-68261",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68261"
},
{
"name": "CVE-2023-54299",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54299"
},
{
"name": "CVE-2023-53768",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53768"
},
{
"name": "CVE-2025-71149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-71149"
},
{
"name": "CVE-2023-54099",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54099"
},
{
"name": "CVE-2025-40319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40319"
},
{
"name": "CVE-2023-54219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54219"
},
{
"name": "CVE-2025-68727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68727"
},
{
"name": "CVE-2023-53847",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53847"
},
{
"name": "CVE-2024-53093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53093"
},
{
"name": "CVE-2026-23080",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23080"
},
{
"name": "CVE-2023-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54121"
},
{
"name": "CVE-2023-54261",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54261"
},
{
"name": "CVE-2023-54005",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-54005"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-68264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68264"
},
{
"name": "CVE-2026-23154",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23154"
},
{
"name": "CVE-2025-68764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68764"
}
],
"initial_release_date": "2026-03-27T00:00:00",
"last_revision_date": "2026-03-27T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0369",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans le noyau Linux de SUSE. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux de SUSE",
"vendor_advisories": [
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20774-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620774-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0970-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260970-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0983-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260983-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0985-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260985-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1077-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261077-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20778-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620778-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20779-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620779-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0961-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260961-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1073-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261073-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20789-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620789-1"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0946-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260946-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0962-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260962-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0967-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260967-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20775-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620775-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1088-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261088-1"
},
{
"published_at": "2026-03-20",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0939-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260939-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20814-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620814-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1046-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261046-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20788-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620788-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20786-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620786-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0954-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260954-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20819-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620819-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1045-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261045-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20815-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620815-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1060-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261060-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20790-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620790-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20772-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620772-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20776-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620776-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1002-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261002-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0984-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260984-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0964-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260964-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20781-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620781-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1081-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261081-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1048-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261048-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1059-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261059-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0958-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260958-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1000-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261000-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1039-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261039-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20791-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620791-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20773-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620773-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20816-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620816-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1083-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261083-1"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0951-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260951-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20787-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620787-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0992-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260992-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20777-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620777-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1089-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261089-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1078-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261078-1"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0997-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260997-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1003-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261003-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20794-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620794-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1041-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261041-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20780-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620780-1"
},
{
"published_at": "2026-03-26",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1049-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261049-1"
},
{
"published_at": "2026-03-25",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:1044-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20261044-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20817-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620817-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20782-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620782-1"
},
{
"published_at": "2026-03-23",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:20792-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620792-1"
},
{
"published_at": "2026-03-22",
"title": "Bulletin de s\u00e9curit\u00e9 SUSE SUSE-SU-2026:0953-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260953-1"
}
]
}
OPENSUSE-SU-2026:10406-1
Vulnerability from csaf_opensuse - Published: 2026-03-22 00:00 - Updated: 2026-03-22 00:00Summary
lemon-3.51.3-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: lemon-3.51.3-1.1 on GA media
Description of the patch: These are all security issues fixed in the lemon-3.51.3-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2026-10406
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "lemon-3.51.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the lemon-3.51.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2026-10406",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_10406-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-70873 page",
"url": "https://www.suse.com/security/cve/CVE-2025-70873/"
}
],
"title": "lemon-3.51.3-1.1 on GA media",
"tracking": {
"current_release_date": "2026-03-22T00:00:00Z",
"generator": {
"date": "2026-03-22T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:10406-1",
"initial_release_date": "2026-03-22T00:00:00Z",
"revision_history": [
{
"date": "2026-03-22T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-1.1.aarch64",
"product": {
"name": "lemon-3.51.3-1.1.aarch64",
"product_id": "lemon-3.51.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-1.1.aarch64",
"product": {
"name": "libsqlite3-0-3.51.3-1.1.aarch64",
"product_id": "libsqlite3-0-3.51.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-32bit-3.51.3-1.1.aarch64",
"product": {
"name": "libsqlite3-0-32bit-3.51.3-1.1.aarch64",
"product_id": "libsqlite3-0-32bit-3.51.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.aarch64",
"product": {
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.aarch64",
"product_id": "libsqlite3-0-x86-64-v3-3.51.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-1.1.aarch64",
"product": {
"name": "sqlite3-3.51.3-1.1.aarch64",
"product_id": "sqlite3-3.51.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-1.1.aarch64",
"product": {
"name": "sqlite3-devel-3.51.3-1.1.aarch64",
"product_id": "sqlite3-devel-3.51.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-doc-3.51.3-1.1.aarch64",
"product": {
"name": "sqlite3-doc-3.51.3-1.1.aarch64",
"product_id": "sqlite3-doc-3.51.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-1.1.aarch64",
"product": {
"name": "sqlite3-tcl-3.51.3-1.1.aarch64",
"product_id": "sqlite3-tcl-3.51.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-1.1.ppc64le",
"product": {
"name": "lemon-3.51.3-1.1.ppc64le",
"product_id": "lemon-3.51.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-1.1.ppc64le",
"product": {
"name": "libsqlite3-0-3.51.3-1.1.ppc64le",
"product_id": "libsqlite3-0-3.51.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-32bit-3.51.3-1.1.ppc64le",
"product": {
"name": "libsqlite3-0-32bit-3.51.3-1.1.ppc64le",
"product_id": "libsqlite3-0-32bit-3.51.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.ppc64le",
"product": {
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.ppc64le",
"product_id": "libsqlite3-0-x86-64-v3-3.51.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-1.1.ppc64le",
"product": {
"name": "sqlite3-3.51.3-1.1.ppc64le",
"product_id": "sqlite3-3.51.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-1.1.ppc64le",
"product": {
"name": "sqlite3-devel-3.51.3-1.1.ppc64le",
"product_id": "sqlite3-devel-3.51.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-doc-3.51.3-1.1.ppc64le",
"product": {
"name": "sqlite3-doc-3.51.3-1.1.ppc64le",
"product_id": "sqlite3-doc-3.51.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-1.1.ppc64le",
"product": {
"name": "sqlite3-tcl-3.51.3-1.1.ppc64le",
"product_id": "sqlite3-tcl-3.51.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-1.1.s390x",
"product": {
"name": "lemon-3.51.3-1.1.s390x",
"product_id": "lemon-3.51.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-1.1.s390x",
"product": {
"name": "libsqlite3-0-3.51.3-1.1.s390x",
"product_id": "libsqlite3-0-3.51.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-32bit-3.51.3-1.1.s390x",
"product": {
"name": "libsqlite3-0-32bit-3.51.3-1.1.s390x",
"product_id": "libsqlite3-0-32bit-3.51.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.s390x",
"product": {
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.s390x",
"product_id": "libsqlite3-0-x86-64-v3-3.51.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-1.1.s390x",
"product": {
"name": "sqlite3-3.51.3-1.1.s390x",
"product_id": "sqlite3-3.51.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-1.1.s390x",
"product": {
"name": "sqlite3-devel-3.51.3-1.1.s390x",
"product_id": "sqlite3-devel-3.51.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-doc-3.51.3-1.1.s390x",
"product": {
"name": "sqlite3-doc-3.51.3-1.1.s390x",
"product_id": "sqlite3-doc-3.51.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-1.1.s390x",
"product": {
"name": "sqlite3-tcl-3.51.3-1.1.s390x",
"product_id": "sqlite3-tcl-3.51.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "lemon-3.51.3-1.1.x86_64",
"product": {
"name": "lemon-3.51.3-1.1.x86_64",
"product_id": "lemon-3.51.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-3.51.3-1.1.x86_64",
"product": {
"name": "libsqlite3-0-3.51.3-1.1.x86_64",
"product_id": "libsqlite3-0-3.51.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-32bit-3.51.3-1.1.x86_64",
"product": {
"name": "libsqlite3-0-32bit-3.51.3-1.1.x86_64",
"product_id": "libsqlite3-0-32bit-3.51.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.x86_64",
"product": {
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.x86_64",
"product_id": "libsqlite3-0-x86-64-v3-3.51.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-3.51.3-1.1.x86_64",
"product": {
"name": "sqlite3-3.51.3-1.1.x86_64",
"product_id": "sqlite3-3.51.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-devel-3.51.3-1.1.x86_64",
"product": {
"name": "sqlite3-devel-3.51.3-1.1.x86_64",
"product_id": "sqlite3-devel-3.51.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-doc-3.51.3-1.1.x86_64",
"product": {
"name": "sqlite3-doc-3.51.3-1.1.x86_64",
"product_id": "sqlite3-doc-3.51.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "sqlite3-tcl-3.51.3-1.1.x86_64",
"product": {
"name": "sqlite3-tcl-3.51.3-1.1.x86_64",
"product_id": "sqlite3-tcl-3.51.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "lemon-3.51.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lemon-3.51.3-1.1.aarch64"
},
"product_reference": "lemon-3.51.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lemon-3.51.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lemon-3.51.3-1.1.ppc64le"
},
"product_reference": "lemon-3.51.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lemon-3.51.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lemon-3.51.3-1.1.s390x"
},
"product_reference": "lemon-3.51.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lemon-3.51.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lemon-3.51.3-1.1.x86_64"
},
"product_reference": "lemon-3.51.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.aarch64"
},
"product_reference": "libsqlite3-0-3.51.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.ppc64le"
},
"product_reference": "libsqlite3-0-3.51.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.s390x"
},
"product_reference": "libsqlite3-0-3.51.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-3.51.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.x86_64"
},
"product_reference": "libsqlite3-0-3.51.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-32bit-3.51.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.aarch64"
},
"product_reference": "libsqlite3-0-32bit-3.51.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-32bit-3.51.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.ppc64le"
},
"product_reference": "libsqlite3-0-32bit-3.51.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-32bit-3.51.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.s390x"
},
"product_reference": "libsqlite3-0-32bit-3.51.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-32bit-3.51.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.x86_64"
},
"product_reference": "libsqlite3-0-32bit-3.51.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.aarch64"
},
"product_reference": "libsqlite3-0-x86-64-v3-3.51.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.ppc64le"
},
"product_reference": "libsqlite3-0-x86-64-v3-3.51.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.s390x"
},
"product_reference": "libsqlite3-0-x86-64-v3-3.51.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsqlite3-0-x86-64-v3-3.51.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.x86_64"
},
"product_reference": "libsqlite3-0-x86-64-v3-3.51.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-3.51.3-1.1.aarch64"
},
"product_reference": "sqlite3-3.51.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-3.51.3-1.1.ppc64le"
},
"product_reference": "sqlite3-3.51.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-3.51.3-1.1.s390x"
},
"product_reference": "sqlite3-3.51.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-3.51.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-3.51.3-1.1.x86_64"
},
"product_reference": "sqlite3-3.51.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.aarch64"
},
"product_reference": "sqlite3-devel-3.51.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.ppc64le"
},
"product_reference": "sqlite3-devel-3.51.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.s390x"
},
"product_reference": "sqlite3-devel-3.51.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-devel-3.51.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.x86_64"
},
"product_reference": "sqlite3-devel-3.51.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-doc-3.51.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.aarch64"
},
"product_reference": "sqlite3-doc-3.51.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-doc-3.51.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.ppc64le"
},
"product_reference": "sqlite3-doc-3.51.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-doc-3.51.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.s390x"
},
"product_reference": "sqlite3-doc-3.51.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-doc-3.51.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.x86_64"
},
"product_reference": "sqlite3-doc-3.51.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.aarch64"
},
"product_reference": "sqlite3-tcl-3.51.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.ppc64le"
},
"product_reference": "sqlite3-tcl-3.51.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.s390x"
},
"product_reference": "sqlite3-tcl-3.51.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sqlite3-tcl-3.51.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.x86_64"
},
"product_reference": "sqlite3-tcl-3.51.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-70873",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-70873"
}
],
"notes": [
{
"category": "general",
"text": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:lemon-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:lemon-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:lemon-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:lemon-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-70873",
"url": "https://www.suse.com/security/cve/CVE-2025-70873"
},
{
"category": "external",
"summary": "SUSE Bug 1259619 for CVE-2025-70873",
"url": "https://bugzilla.suse.com/1259619"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:lemon-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:lemon-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:lemon-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:lemon-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:lemon-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:lemon-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:lemon-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:lemon-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:libsqlite3-0-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:libsqlite3-0-32bit-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:libsqlite3-0-x86-64-v3-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-devel-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-doc-3.51.3-1.1.x86_64",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.aarch64",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.ppc64le",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.s390x",
"openSUSE Tumbleweed:sqlite3-tcl-3.51.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-22T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-70873"
}
]
}
GHSA-P36R-6G67-869C
Vulnerability from github – Published: 2026-03-12 21:34 – Updated: 2026-03-16 15:30
VLAI?
Details
An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2025-70873"
],
"database_specific": {
"cwe_ids": [
"CWE-244"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2026-03-12T19:16:15Z",
"severity": "HIGH"
},
"details": "An information disclosure issue in the zipfileInflate function in the zipfile extension in SQLite v3.51.1 and earlier allows attackers to obtain heap memory via supplying a crafted ZIP file.",
"id": "GHSA-p36r-6g67-869c",
"modified": "2026-03-16T15:30:34Z",
"published": "2026-03-12T21:34:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-70873"
},
{
"type": "WEB",
"url": "https://gist.github.com/cnwangjihe/f496393f30f5ecec5b18c8f5ab072054"
},
{
"type": "WEB",
"url": "https://sqlite.org/forum/forumpost/761eac3c82"
},
{
"type": "WEB",
"url": "https://sqlite.org/src/info/3d459f1fb1bd1b5e"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
]
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…