WID-SEC-W-2025-0403
Vulnerability from csaf_certbund - Published: 2025-02-18 23:00 - Updated: 2025-10-29 23:00Summary
libxml2: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: libxml ist ein C Parser und Toolkit, welches für das Gnome Projekt entwickelt wurde.
Angriff: Ein lokaler Angreifer kann mehrere Schwachstellen in libxml2 ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen nicht näher spezifizierten Angriff zu starten.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
- Windows
References
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libxml ist ein C Parser und Toolkit, welches f\u00fcr das Gnome Projekt entwickelt wurde.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in libxml2 ausnutzen, um einen Denial-of-Service-Zustand zu erzeugen oder einen nicht n\u00e4her spezifizierten Angriff zu starten.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0403 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0403.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0403 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0403"
},
{
"category": "external",
"summary": "Mailing list OSS Security - Multiple vulnerabilities in libxml2 vom 2025-02-18",
"url": "https://seclists.org/oss-sec/2025/q1/145"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2025-02-18",
"url": "https://github.com/advisories/GHSA-m366-8h8r-6fqr"
},
{
"category": "external",
"summary": "GitHub Advisory Database vom 2025-02-18",
"url": "https://github.com/advisories/GHSA-fgfv-9xqc-v794"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4064 vom 2025-02-22",
"url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7302-1 vom 2025-02-25",
"url": "https://ubuntu.com/security/notices/USN-7302-1"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0747-1 vom 2025-02-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-February/020468.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0746-1 vom 2025-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/VIOKVZE6T5AVLQCUDNVWVJT6H4XRBGD7/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0748-1 vom 2025-02-28",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/TO4WCOJEJQETOQYEZTM54UWH7UEQKAVH/"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250306-0004 vom 2025-03-06",
"url": "https://security.netapp.com/advisory/ntap-20250306-0004/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2483 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2483"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2482 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2482"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2507 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2507"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2513 vom 2025-03-10",
"url": "https://access.redhat.com/errata/RHSA-2025:2513"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2654 vom 2025-03-11",
"url": "https://access.redhat.com/errata/RHSA-2025:2654"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2660 vom 2025-03-11",
"url": "https://access.redhat.com/errata/RHSA-2025:2660"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2673 vom 2025-03-12",
"url": "https://access.redhat.com/errata/RHSA-2025:2673"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2679 vom 2025-03-12",
"url": "https://access.redhat.com/errata/RHSA-2025:2679"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2686 vom 2025-03-13",
"url": "https://linux.oracle.com/errata/ELSA-2025-2686.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2679 vom 2025-03-12",
"url": "https://linux.oracle.com/errata/ELSA-2025-2679.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2686 vom 2025-03-12",
"url": "https://access.redhat.com/errata/RHSA-2025:2686"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2678 vom 2025-03-12",
"url": "https://access.redhat.com/errata/RHSA-2025:2678"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-ADBB0031F7 vom 2025-03-13",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-adbb0031f7"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-65790C11EB vom 2025-03-13",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-65790c11eb"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-B9170CD464 vom 2025-03-13",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-b9170cd464"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-1965 vom 2025-03-17",
"url": "https://alas.aws.amazon.com/ALAS-2025-1965.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2710 vom 2025-03-20",
"url": "https://access.redhat.com/errata/RHSA-2025:2710"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:2701 vom 2025-03-20",
"url": "https://access.redhat.com/errata/RHSA-2025:2701"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-2673 vom 2025-03-21",
"url": "https://linux.oracle.com/errata/ELSA-2025-2673.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0976-1 vom 2025-03-21",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020569.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250321-0006 vom 2025-03-21",
"url": "https://security.netapp.com/advisory/ntap-20250321-0006/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3066 vom 2025-03-25",
"url": "https://access.redhat.com/errata/RHSA-2025:3066"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3124 vom 2025-03-24",
"url": "https://access.redhat.com/errata/RHSA-2025:3124"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2794 vom 2025-03-25",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2794.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3059 vom 2025-03-26",
"url": "https://access.redhat.com/errata/RHSA-2025:3059"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3132 vom 2025-03-26",
"url": "https://access.redhat.com/errata/RHSA-2025:3132"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3055 vom 2025-03-26",
"url": "https://access.redhat.com/errata/RHSA-2025:3055"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3131 vom 2025-03-26",
"url": "https://access.redhat.com/errata/RHSA-2025:3131"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250328-0010 vom 2025-03-28",
"url": "https://security.netapp.com/advisory/ntap-20250328-0010/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3297 vom 2025-04-02",
"url": "https://access.redhat.com/errata/RHSA-2025:3297"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3301 vom 2025-04-03",
"url": "https://access.redhat.com/errata/RHSA-2025:3301"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3453 vom 2025-04-02",
"url": "https://access.redhat.com/errata/RHSA-2025:3453"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3569 vom 2025-04-09",
"url": "https://access.redhat.com/errata/RHSA-2025:3569"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3573 vom 2025-04-10",
"url": "https://access.redhat.com/errata/RHSA-2025:3573"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3775 vom 2025-04-16",
"url": "https://access.redhat.com/errata/RHSA-2025:3775"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:3780 vom 2025-04-17",
"url": "https://access.redhat.com/errata/RHSA-2025:3780"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:4005 vom 2025-04-17",
"url": "https://access.redhat.com/errata/RHSA-2025:4005"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7231915 vom 2025-04-26",
"url": "https://www.ibm.com/support/pages/node/7231915"
},
{
"category": "external",
"summary": "IGEL Security Notice ISN-2025-08 vom 2025-04-29",
"url": "https://kb.igel.com/security-safety/current/isn-2025-08-libxml2-vulnerabilities"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7232272 vom 2025-05-01",
"url": "https://www.ibm.com/support/pages/node/7232272"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7233150 vom 2025-05-12",
"url": "https://www.ibm.com/support/pages/node/7233150"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8278 vom 2025-05-29",
"url": "https://rhn.redhat.com/errata/RHSA-2025:8278.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8274 vom 2025-05-29",
"url": "https://rhn.redhat.com/errata/RHSA-2025:8274.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8278 vom 2025-05-28",
"url": "https://access.redhat.com/errata/RHSA-2025:8278"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:8274 vom 2025-05-28",
"url": "https://access.redhat.com/errata/RHSA-2025:8274"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-213 vom 2025-05-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000326299/dsa-2025-213-security-update-for-dell-avamar-dell-networker-virtual-edition-nve-and-dell-powerprotect-dp-series-appliance-dell-integrated-data-protection-appliance-idpa-multiple-third-party-vulnerabilities"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20274-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021047.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20177-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021166.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7235623 vom 2025-06-04",
"url": "https://www.ibm.com/support/pages/node/7235623"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5949 vom 2025-06-25",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00113.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:9895 vom 2025-06-30",
"url": "https://access.redhat.com/errata/RHSA-2025:9895"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-266 vom 2025-07-01",
"url": "https://www.dell.com/support/kbdoc/000338768"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7238985 vom 2025-07-07",
"url": "https://www.ibm.com/support/pages/node/7238985"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-262 vom 2025-08-01",
"url": "https://www.dell.com/support/kbdoc/000337955"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-272 vom 2025-08-06",
"url": "https://www.dell.com/support/kbdoc/000353080"
},
{
"category": "external",
"summary": "Dell Security Update vom 2025-10-02",
"url": "https://www.dell.com/support/kbdoc/000376224"
},
{
"category": "external",
"summary": "fluent-package v5.0.8 release vom 2025-10-08",
"url": "https://www.fluentd.org/blog/fluent-package-v5.0.8-has-been-released"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2025-338 vom 2025-10-30",
"url": "https://www.dell.com/support/kbdoc/de-de/000385427/dsa-2025-338-security-update-for-dell-data-protection-advisor-for-jdk-8u451-vulnerabilities"
}
],
"source_lang": "en-US",
"title": "libxml2: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-29T23:00:00.000+00:00",
"generator": {
"date": "2025-10-30T08:13:52.160+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-0403",
"initial_release_date": "2025-02-18T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-02-18T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-02-23T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-02-25T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-03-02T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-06T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2025-03-09T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-10T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-11T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-12T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-03-13T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2025-03-17T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-19T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-20T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-03-23T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von SUSE und NetApp aufgenommen"
},
{
"date": "2025-03-24T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-25T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-30T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von NetApp aufgenommen"
},
{
"date": "2025-04-02T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-09T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-10T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-16T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-21T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-04-27T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von IGEL aufgenommen"
},
{
"date": "2025-05-01T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-05-12T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-05-29T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-03T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-06-29T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-07-06T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-07-07T22:00:00.000+00:00",
"number": "36",
"summary": "Doppelte Eintragung bereinigt"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-08-05T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-10-01T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Dell aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "40",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-10-29T23:00:00.000+00:00",
"number": "41",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "41"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell Avamar",
"product": {
"name": "Dell Avamar",
"product_id": "T039664",
"product_identification_helper": {
"cpe": "cpe:/a:dell:avamar:-"
}
}
},
{
"category": "product_name",
"name": "Dell Data Protection Advisor",
"product": {
"name": "Dell Data Protection Advisor",
"product_id": "T021498",
"product_identification_helper": {
"cpe": "cpe:/a:dell:data_protection_advisor:-"
}
}
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker",
"product": {
"name": "Dell NetWorker",
"product_id": "T034583",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:virtual"
}
}
},
{
"category": "product_version_range",
"name": "\u003c19.13",
"product": {
"name": "Dell NetWorker \u003c19.13",
"product_id": "T044954"
}
},
{
"category": "product_version",
"name": "19.13",
"product": {
"name": "Dell NetWorker 19.13",
"product_id": "T044954-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:19.13"
}
}
},
{
"category": "product_version_range",
"name": "\u003c19.11.0.5",
"product": {
"name": "Dell NetWorker \u003c19.11.0.5",
"product_id": "T044959"
}
},
{
"category": "product_version",
"name": "19.11.0.5",
"product": {
"name": "Dell NetWorker 19.11.0.5",
"product_id": "T044959-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:19.11.0.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c19.12.0.2",
"product": {
"name": "Dell NetWorker \u003c19.12.0.2",
"product_id": "T045790"
}
},
{
"category": "product_version",
"name": "19.12.0.2",
"product": {
"name": "Dell NetWorker 19.12.0.2",
"product_id": "T045790-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:19.12.0.2"
}
}
},
{
"category": "product_version_range",
"name": "\u003c19.11.0.6",
"product": {
"name": "Dell NetWorker \u003c19.11.0.6",
"product_id": "T045791"
}
},
{
"category": "product_version",
"name": "19.11.0.6",
"product": {
"name": "Dell NetWorker 19.11.0.6",
"product_id": "T045791-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:19.11.0.6"
}
}
}
],
"category": "product_name",
"name": "NetWorker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.4.0.0",
"product_id": "T045879"
}
},
{
"category": "product_version",
"name": "8.4.0.0",
"product": {
"name": "Dell PowerProtect Data Domain 8.4.0.0",
"product_id": "T045879-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.4.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.10.1.70",
"product_id": "T045881"
}
},
{
"category": "product_version",
"name": "7.10.1.70",
"product": {
"name": "Dell PowerProtect Data Domain 7.10.1.70",
"product_id": "T045881-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.10.1.70"
}
}
},
{
"category": "product_version_range",
"name": "\u003c7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain \u003c7.13.1.40",
"product_id": "T047343"
}
},
{
"category": "product_version",
"name": "7.13.1.40",
"product": {
"name": "Dell PowerProtect Data Domain 7.13.1.40",
"product_id": "T047343-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:7.13.1.40"
}
}
},
{
"category": "product_version_range",
"name": "\u003c8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain \u003c8.3.1.10",
"product_id": "T047344"
}
},
{
"category": "product_version",
"name": "8.3.1.10",
"product": {
"name": "Dell PowerProtect Data Domain 8.3.1.10",
"product_id": "T047344-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerprotect_data_domain:8.3.1.10"
}
}
}
],
"category": "product_name",
"name": "PowerProtect Data Domain"
},
{
"branches": [
{
"category": "product_version_range",
"name": "OneFS \u003c9.10.1.3",
"product": {
"name": "Dell PowerScale OneFS \u003c9.10.1.3",
"product_id": "T045897"
}
},
{
"category": "product_version",
"name": "OneFS 9.10.1.3",
"product": {
"name": "Dell PowerScale OneFS 9.10.1.3",
"product_id": "T045897-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.10.1.3"
}
}
},
{
"category": "product_version_range",
"name": "OneFS \u003c9.11.0.1",
"product": {
"name": "Dell PowerScale OneFS \u003c9.11.0.1",
"product_id": "T045898"
}
},
{
"category": "product_version",
"name": "OneFS 9.11.0.1",
"product": {
"name": "Dell PowerScale OneFS 9.11.0.1",
"product_id": "T045898-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:dell:powerscale_onefs:onefs__9.11.0.1"
}
}
}
],
"category": "product_name",
"name": "PowerScale"
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "1139691",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
},
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "IBM AIX 7.2",
"product_id": "434967",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.2"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"category": "product_name",
"name": "IBM App Connect Enterprise",
"product": {
"name": "IBM App Connect Enterprise",
"product_id": "T032495",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Operator",
"product": {
"name": "IBM MQ Operator",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
}
],
"category": "product_name",
"name": "MQ"
},
{
"branches": [
{
"category": "product_version",
"name": "V10",
"product": {
"name": "IBM Power Hardware Management Console V10",
"product_id": "T023373",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:v10"
}
}
}
],
"category": "product_name",
"name": "Power Hardware Management Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11 IF04",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11 IF04",
"product_id": "T043169"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11 IF04",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11 IF04",
"product_id": "T043169-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11_if04"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "IBM VIOS 3.1",
"product_id": "1039165",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:3.1"
}
}
},
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "1522854",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.8.1",
"product": {
"name": "IGEL OS \u003c12.8.1",
"product_id": "T043217"
}
},
{
"category": "product_version",
"name": "12.8.1",
"product": {
"name": "IGEL OS 12.8.1",
"product_id": "T043217-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:12.8.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c11.11.100",
"product": {
"name": "IGEL OS \u003c11.11.100",
"product_id": "T043218"
}
},
{
"category": "product_version",
"name": "11.11.100",
"product": {
"name": "IGEL OS 11.11.100",
"product_id": "T043218-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:igel:os:11.11.100"
}
}
}
],
"category": "product_name",
"name": "OS"
}
],
"category": "vendor",
"name": "IGEL"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "for VMware vSphere",
"product": {
"name": "NetApp ActiveIQ Unified Manager for VMware vSphere",
"product_id": "T025152",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:active_iq_unified_manager:for_vmware_vsphere"
}
}
}
],
"category": "product_name",
"name": "ActiveIQ Unified Manager"
},
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "NetApp Data ONTAP 9",
"product_id": "T039981",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:9"
}
}
}
],
"category": "product_name",
"name": "Data ONTAP"
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.0.8",
"product": {
"name": "Open Source Fluentd \u003c5.0.8",
"product_id": "T047479"
}
},
{
"category": "product_version",
"name": "5.0.8",
"product": {
"name": "Open Source Fluentd 5.0.8",
"product_id": "T047479-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:fluentd:fluentd:5.0.8"
}
}
}
],
"category": "product_name",
"name": "Fluentd"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.14.0",
"product": {
"name": "Open Source libxml2 \u003c2.14.0",
"product_id": "T041301"
}
},
{
"category": "product_version",
"name": "2.14.0",
"product": {
"name": "Open Source libxml2 2.14.0",
"product_id": "T041301-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:xmlsoft:libxml2:2.14.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c2.13.6",
"product": {
"name": "Open Source libxml2 \u003c2.13.6",
"product_id": "T041302"
}
},
{
"category": "product_version",
"name": "2.13.6",
"product": {
"name": "Open Source libxml2 2.13.6",
"product_id": "T041302-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:xmlsoft:libxml2:2.13.6"
}
}
},
{
"category": "product_version_range",
"name": "\u003c2.12.10",
"product": {
"name": "Open Source libxml2 \u003c2.12.10",
"product_id": "T041303"
}
},
{
"category": "product_version",
"name": "2.12.10",
"product": {
"name": "Open Source libxml2 2.12.10",
"product_id": "T041303-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:xmlsoft:libxml2:2.12.10"
}
}
}
],
"category": "product_name",
"name": "libxml2"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.4",
"product": {
"name": "Red Hat Ansible Automation Platform 2.4",
"product_id": "1496312",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ansible_automation_platform:2.4"
}
}
}
],
"category": "product_name",
"name": "Ansible Automation Platform"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Service Interconnect 1",
"product": {
"name": "Red Hat Enterprise Linux Service Interconnect 1",
"product_id": "T028472",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1"
}
}
},
{
"category": "product_version",
"name": "Service Interconnect 1.4",
"product": {
"name": "Red Hat Enterprise Linux Service Interconnect 1.4",
"product_id": "T044942",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1.4"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.4.62",
"product": {
"name": "Red Hat JBoss Core Services \u003c2.4.62",
"product_id": "T042316"
}
},
{
"category": "product_version",
"name": "2.4.62",
"product": {
"name": "Red Hat JBoss Core Services 2.4.62",
"product_id": "T042316-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:2.4.62"
}
}
}
],
"category": "product_name",
"name": "JBoss Core Services"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.13.56",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.13.56",
"product_id": "T042009"
}
},
{
"category": "product_version",
"name": "Container Platform 4.13.56",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13.56",
"product_id": "T042009-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.13.56"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.49",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.49",
"product_id": "T042010"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.49",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.49",
"product_id": "T042010-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.49"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.17.23",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.17.23",
"product_id": "T042314"
}
},
{
"category": "product_version",
"name": "Container Platform 4.17.23",
"product": {
"name": "Red Hat OpenShift Container Platform 4.17.23",
"product_id": "T042314-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.17.23"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.16.38",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.16.38",
"product_id": "T042315"
}
},
{
"category": "product_version",
"name": "Container Platform 4.16.38",
"product": {
"name": "Red Hat OpenShift Container Platform 4.16.38",
"product_id": "T042315-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.16.38"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.75",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.75",
"product_id": "T042745"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12.75",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12.75",
"product_id": "T042745-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.12.75"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.13.57",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.13.57",
"product_id": "T042963"
}
},
{
"category": "product_version",
"name": "Container Platform 4.13.57",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13.57",
"product_id": "T042963-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.13.57"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-56171",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T036688",
"T004914",
"1139691",
"T043169",
"T021498",
"T042314",
"T042315",
"T044954",
"T042316",
"T047343",
"398363",
"T041303",
"T041302",
"T041301",
"1496312",
"T042010",
"T045881",
"T023373",
"T047344",
"T028472",
"434967",
"1039165",
"T044959",
"1522854",
"T039981",
"74185",
"T032495",
"T039664",
"T045897",
"T044942",
"T045898",
"2951",
"T002207",
"T042963",
"T045879",
"T043217",
"T000126",
"T042745",
"T043218",
"T042009",
"T045790",
"T045791",
"T047479"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2024-56171"
},
{
"cve": "CVE-2025-24928",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T036688",
"T004914",
"1139691",
"T043169",
"T021498",
"T042314",
"T042315",
"T044954",
"T042316",
"T047343",
"398363",
"T041303",
"T041302",
"T041301",
"1496312",
"T042010",
"T045881",
"T023373",
"T047344",
"T028472",
"434967",
"1039165",
"T044959",
"1522854",
"T039981",
"74185",
"T032495",
"T039664",
"T045897",
"T044942",
"T045898",
"2951",
"T002207",
"T042963",
"T045879",
"T043217",
"T000126",
"T042745",
"T043218",
"T042009",
"T045790",
"T045791",
"T047479"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-24928"
},
{
"cve": "CVE-2025-27113",
"product_status": {
"known_affected": [
"T025152",
"67646",
"T034583",
"T036688",
"T004914",
"1139691",
"T043169",
"T021498",
"T042314",
"T042315",
"T044954",
"T042316",
"T047343",
"398363",
"T041303",
"T041302",
"T041301",
"1496312",
"T042010",
"T045881",
"T023373",
"T047344",
"T028472",
"434967",
"1039165",
"T044959",
"1522854",
"T039981",
"74185",
"T032495",
"T039664",
"T045897",
"T044942",
"T045898",
"2951",
"T002207",
"T042963",
"T045879",
"T043217",
"T000126",
"T042745",
"T043218",
"T042009",
"T045790",
"T045791",
"T047479"
]
},
"release_date": "2025-02-18T23:00:00.000+00:00",
"title": "CVE-2025-27113"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…