{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"critical"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2018-25154","title":"Title"},{"category":"description","text":"GNU Barcode 0.99 contains a buffer overflow vulnerability in its code 93 encoding process that allows attackers to trigger memory corruption. Attackers can exploit boundary errors during input file processing to potentially execute arbitrary code on the affected system.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2018-25154","url":"https://www.suse.com/security/cve/CVE-2018-25154"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1255681 for CVE-2018-25154","url":"https://bugzilla.suse.com/1255681"}],"title":"SUSE CVE CVE-2018-25154","tracking":{"current_release_date":"2025-12-30T00:30:59Z","generator":{"date":"2025-12-30T00:30:59Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2018-25154","initial_release_date":"2025-12-30T00:30:59Z","revision_history":[{"date":"2025-12-30T00:30:59Z","number":"2","summary":"references added,severity changed from  to critical"}],"status":"interim","version":"2"}}}