opensuse-su-2024:11074-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
libprotobuf-nanopb0-0.4.5-1.3 on GA media
Notes
Title of the patch
libprotobuf-nanopb0-0.4.5-1.3 on GA media
Description of the patch
These are all security issues fixed in the libprotobuf-nanopb0-0.4.5-1.3 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-11074
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "libprotobuf-nanopb0-0.4.5-1.3 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the libprotobuf-nanopb0-0.4.5-1.3 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-11074", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11074-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2020-26243 page", "url": "https://www.suse.com/security/cve/CVE-2020-26243/" }, { "category": "self", "summary": "SUSE CVE CVE-2020-5235 page", "url": "https://www.suse.com/security/cve/CVE-2020-5235/" }, { "category": "self", "summary": "SUSE CVE CVE-2021-21401 page", "url": "https://www.suse.com/security/cve/CVE-2021-21401/" } ], "title": "libprotobuf-nanopb0-0.4.5-1.3 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:11074-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "libprotobuf-nanopb0-0.4.5-1.3.aarch64", "product": { "name": "libprotobuf-nanopb0-0.4.5-1.3.aarch64", "product_id": "libprotobuf-nanopb0-0.4.5-1.3.aarch64" } }, { "category": "product_version", "name": "nanopb-devel-0.4.5-1.3.aarch64", "product": { "name": "nanopb-devel-0.4.5-1.3.aarch64", "product_id": "nanopb-devel-0.4.5-1.3.aarch64" } }, { "category": "product_version", "name": "nanopb-source-0.4.5-1.3.aarch64", "product": { "name": "nanopb-source-0.4.5-1.3.aarch64", "product_id": "nanopb-source-0.4.5-1.3.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "product": { "name": "libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "product_id": "libprotobuf-nanopb0-0.4.5-1.3.ppc64le" } }, { "category": "product_version", "name": "nanopb-devel-0.4.5-1.3.ppc64le", "product": { "name": "nanopb-devel-0.4.5-1.3.ppc64le", "product_id": "nanopb-devel-0.4.5-1.3.ppc64le" } }, { "category": "product_version", "name": "nanopb-source-0.4.5-1.3.ppc64le", "product": { "name": "nanopb-source-0.4.5-1.3.ppc64le", "product_id": "nanopb-source-0.4.5-1.3.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "libprotobuf-nanopb0-0.4.5-1.3.s390x", "product": { "name": "libprotobuf-nanopb0-0.4.5-1.3.s390x", "product_id": "libprotobuf-nanopb0-0.4.5-1.3.s390x" } }, { "category": "product_version", "name": "nanopb-devel-0.4.5-1.3.s390x", "product": { "name": "nanopb-devel-0.4.5-1.3.s390x", "product_id": "nanopb-devel-0.4.5-1.3.s390x" } }, { "category": "product_version", "name": "nanopb-source-0.4.5-1.3.s390x", "product": { "name": "nanopb-source-0.4.5-1.3.s390x", "product_id": "nanopb-source-0.4.5-1.3.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "libprotobuf-nanopb0-0.4.5-1.3.x86_64", "product": { "name": "libprotobuf-nanopb0-0.4.5-1.3.x86_64", "product_id": "libprotobuf-nanopb0-0.4.5-1.3.x86_64" } }, { "category": "product_version", "name": "nanopb-devel-0.4.5-1.3.x86_64", "product": { "name": "nanopb-devel-0.4.5-1.3.x86_64", "product_id": "nanopb-devel-0.4.5-1.3.x86_64" } }, { "category": "product_version", "name": "nanopb-source-0.4.5-1.3.x86_64", "product": { "name": "nanopb-source-0.4.5-1.3.x86_64", "product_id": "nanopb-source-0.4.5-1.3.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libprotobuf-nanopb0-0.4.5-1.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64" }, "product_reference": "libprotobuf-nanopb0-0.4.5-1.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libprotobuf-nanopb0-0.4.5-1.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le" }, "product_reference": "libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libprotobuf-nanopb0-0.4.5-1.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x" }, "product_reference": "libprotobuf-nanopb0-0.4.5-1.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libprotobuf-nanopb0-0.4.5-1.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64" }, "product_reference": "libprotobuf-nanopb0-0.4.5-1.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nanopb-devel-0.4.5-1.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64" }, "product_reference": "nanopb-devel-0.4.5-1.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nanopb-devel-0.4.5-1.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le" }, "product_reference": "nanopb-devel-0.4.5-1.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nanopb-devel-0.4.5-1.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x" }, "product_reference": "nanopb-devel-0.4.5-1.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nanopb-devel-0.4.5-1.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64" }, "product_reference": "nanopb-devel-0.4.5-1.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nanopb-source-0.4.5-1.3.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64" }, "product_reference": "nanopb-source-0.4.5-1.3.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nanopb-source-0.4.5-1.3.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le" }, "product_reference": "nanopb-source-0.4.5-1.3.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nanopb-source-0.4.5-1.3.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x" }, "product_reference": "nanopb-source-0.4.5-1.3.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "nanopb-source-0.4.5-1.3.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" }, "product_reference": "nanopb-source-0.4.5-1.3.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2020-26243", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-26243" } ], "notes": [ { "category": "general", "text": "Nanopb is a small code-size Protocol Buffers implementation. In Nanopb before versions 0.4.4 and 0.3.9.7, decoding specifically formed message can leak memory if dynamic allocation is enabled and an oneof field contains a static submessage that contains a dynamic field, and the message being decoded contains the submessage multiple times. This is rare in normal messages, but it is a concern when untrusted data is parsed. This is fixed in versions 0.3.9.7 and 0.4.4. The following workarounds are available: 1) Set the option `no_unions` for the oneof field. This will generate fields as separate instead of C union, and avoids triggering the problematic code. 2) Set the type of the submessage field inside oneof to `FT_POINTER`. This way the whole submessage will be dynamically allocated and the problematic code is not executed. 3) Use an arena allocator for nanopb, to make sure all memory can be released afterwards.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-26243", "url": "https://www.suse.com/security/cve/CVE-2020-26243" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2020-26243" }, { "cve": "CVE-2020-5235", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2020-5235" } ], "notes": [ { "category": "general", "text": "There is a potentially exploitable out of memory condition In Nanopb before 0.4.1, 0.3.9.5, and 0.2.9.4. When nanopb is compiled with PB_ENABLE_MALLOC, the message to be decoded contains a repeated string, bytes or message field and realloc() runs out of memory when expanding the array nanopb can end up calling `free()` on a pointer value that comes from uninitialized memory. Depending on platform this can result in a crash or further memory corruption, which may be exploitable in some cases. This problem is fixed in nanopb-0.4.1, nanopb-0.3.9.5, nanopb-0.2.9.4.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2020-5235", "url": "https://www.suse.com/security/cve/CVE-2020-5235" }, { "category": "external", "summary": "SUSE Bug 1162647 for CVE-2020-5235", "url": "https://bugzilla.suse.com/1162647" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2020-5235" }, { "cve": "CVE-2021-21401", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2021-21401" } ], "notes": [ { "category": "general", "text": "Nanopb is a small code-size Protocol Buffers implementation in ansi C. In Nanopb before versions 0.3.9.8 and 0.4.5, decoding a specifically formed message can cause invalid `free()` or `realloc()` calls if the message type contains an `oneof` field, and the `oneof` directly contains both a pointer field and a non-pointer field. If the message data first contains the non-pointer field and then the pointer field, the data of the non-pointer field is incorrectly treated as if it was a pointer value. Such message data rarely occurs in normal messages, but it is a concern when untrusted data is parsed. This has been fixed in versions 0.3.9.8 and 0.4.5. See referenced GitHub Security Advisory for more information including workarounds.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2021-21401", "url": "https://www.suse.com/security/cve/CVE-2021-21401" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.1, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.s390x", "openSUSE Tumbleweed:libprotobuf-nanopb0-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-devel-0.4.5-1.3.x86_64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.aarch64", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.ppc64le", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.s390x", "openSUSE Tumbleweed:nanopb-source-0.4.5-1.3.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2021-21401" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…