SUSE-SU-2025:20406-1
Vulnerability from csaf_suse - Published: 2025-06-13 11:05 - Updated: 2025-06-13 11:05Summary
Security update for openssl-3
Notes
Title of the patch
Security update for openssl-3
Description of the patch
This update for openssl-3 fixes the following issues:
- CVE-2025-27587: Fixed Minerva side channel vulnerability in P-384 on PPC arch (bsc#1240366)
- CVE-2024-13176: Fixed timing side-channel in the ECDSA signature computation (bsc#1236136)
Patchnames
SUSE-SLE-Micro-6.0-353
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for openssl-3",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for openssl-3 fixes the following issues:\n\n- CVE-2025-27587: Fixed Minerva side channel vulnerability in P-384 on PPC arch (bsc#1240366)\n- CVE-2024-13176: Fixed timing side-channel in the ECDSA signature computation (bsc#1236136)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-353",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20406-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20406-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520406-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20406-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040341.html"
},
{
"category": "self",
"summary": "SUSE Bug 1236136",
"url": "https://bugzilla.suse.com/1236136"
},
{
"category": "self",
"summary": "SUSE Bug 1240366",
"url": "https://bugzilla.suse.com/1240366"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-13176 page",
"url": "https://www.suse.com/security/cve/CVE-2024-13176/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27587 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27587/"
}
],
"title": "Security update for openssl-3",
"tracking": {
"current_release_date": "2025-06-13T11:05:04Z",
"generator": {
"date": "2025-06-13T11:05:04Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20406-1",
"initial_release_date": "2025-06-13T11:05:04Z",
"revision_history": [
{
"date": "2025-06-13T11:05:04Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-8.1.aarch64",
"product": {
"name": "libopenssl-3-devel-3.1.4-8.1.aarch64",
"product_id": "libopenssl-3-devel-3.1.4-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-8.1.aarch64",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-8.1.aarch64",
"product_id": "libopenssl-3-fips-provider-3.1.4-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-8.1.aarch64",
"product": {
"name": "libopenssl3-3.1.4-8.1.aarch64",
"product_id": "libopenssl3-3.1.4-8.1.aarch64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-8.1.aarch64",
"product": {
"name": "openssl-3-3.1.4-8.1.aarch64",
"product_id": "openssl-3-3.1.4-8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-8.1.s390x",
"product": {
"name": "libopenssl-3-devel-3.1.4-8.1.s390x",
"product_id": "libopenssl-3-devel-3.1.4-8.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-8.1.s390x",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-8.1.s390x",
"product_id": "libopenssl-3-fips-provider-3.1.4-8.1.s390x"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-8.1.s390x",
"product": {
"name": "libopenssl3-3.1.4-8.1.s390x",
"product_id": "libopenssl3-3.1.4-8.1.s390x"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-8.1.s390x",
"product": {
"name": "openssl-3-3.1.4-8.1.s390x",
"product_id": "openssl-3-3.1.4-8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libopenssl-3-devel-3.1.4-8.1.x86_64",
"product": {
"name": "libopenssl-3-devel-3.1.4-8.1.x86_64",
"product_id": "libopenssl-3-devel-3.1.4-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl-3-fips-provider-3.1.4-8.1.x86_64",
"product": {
"name": "libopenssl-3-fips-provider-3.1.4-8.1.x86_64",
"product_id": "libopenssl-3-fips-provider-3.1.4-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "libopenssl3-3.1.4-8.1.x86_64",
"product": {
"name": "libopenssl3-3.1.4-8.1.x86_64",
"product_id": "libopenssl3-3.1.4-8.1.x86_64"
}
},
{
"category": "product_version",
"name": "openssl-3-3.1.4-8.1.x86_64",
"product": {
"name": "openssl-3-3.1.4-8.1.x86_64",
"product_id": "openssl-3-3.1.4-8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-8.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.aarch64"
},
"product_reference": "libopenssl-3-devel-3.1.4-8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-8.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.s390x"
},
"product_reference": "libopenssl-3-devel-3.1.4-8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-devel-3.1.4-8.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.x86_64"
},
"product_reference": "libopenssl-3-devel-3.1.4-8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-8.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.aarch64"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-8.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.s390x"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl-3-fips-provider-3.1.4-8.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.x86_64"
},
"product_reference": "libopenssl-3-fips-provider-3.1.4-8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-8.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.aarch64"
},
"product_reference": "libopenssl3-3.1.4-8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-8.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.s390x"
},
"product_reference": "libopenssl3-3.1.4-8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libopenssl3-3.1.4-8.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.x86_64"
},
"product_reference": "libopenssl3-3.1.4-8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-8.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.aarch64"
},
"product_reference": "openssl-3-3.1.4-8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-8.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.s390x"
},
"product_reference": "openssl-3-3.1.4-8.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "openssl-3-3.1.4-8.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.x86_64"
},
"product_reference": "openssl-3-3.1.4-8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-13176",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-13176"
}
],
"notes": [
{
"category": "general",
"text": "Issue summary: A timing side-channel which could potentially allow recovering\nthe private key exists in the ECDSA signature computation.\n\nImpact summary: A timing side-channel in ECDSA signature computations\ncould allow recovering the private key by an attacker. However, measuring\nthe timing would require either local access to the signing application or\na very fast network connection with low latency.\n\nThere is a timing signal of around 300 nanoseconds when the top word of\nthe inverted ECDSA nonce value is zero. This can happen with significant\nprobability only for some of the supported elliptic curves. In particular\nthe NIST P-521 curve is affected. To be able to measure this leak, the attacker\nprocess must either be located in the same physical computer or must\nhave a very fast network connection with low latency. For that reason\nthe severity of this vulnerability is Low.\n\nThe FIPS modules in 3.4, 3.3, 3.2, 3.1 and 3.0 are affected by this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-13176",
"url": "https://www.suse.com/security/cve/CVE-2024-13176"
},
{
"category": "external",
"summary": "SUSE Bug 1236136 for CVE-2024-13176",
"url": "https://bugzilla.suse.com/1236136"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-13T11:05:04Z",
"details": "moderate"
}
],
"title": "CVE-2024-13176"
},
{
"cve": "CVE-2025-27587",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27587"
}
],
"notes": [
{
"category": "general",
"text": "OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27587",
"url": "https://www.suse.com/security/cve/CVE-2025-27587"
},
{
"category": "external",
"summary": "SUSE Bug 1240366 for CVE-2025-27587",
"url": "https://bugzilla.suse.com/1240366"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-devel-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl-3-fips-provider-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:libopenssl3-3.1.4-8.1.x86_64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.aarch64",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.s390x",
"SUSE Linux Micro 6.0:openssl-3-3.1.4-8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-13T11:05:04Z",
"details": "moderate"
}
],
"title": "CVE-2025-27587"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…