Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-6271 (GCVE-0-2014-6271)
Vulnerability from cvelistv5 – Published: 2014-09-24 18:00 – Updated: 2025-10-22 00:05- n/a
CISA Known Exploited Vulnerability
Data from the CISA Known Exploited Vulnerabilities Catalog
Date added: 2022-01-28
Due date: 2022-07-28
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2014-6271
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T12:10:13.276Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "37816",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/37816/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html"
},
{
"name": "SUSE-SU-2014:1223",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
},
{
"name": "HPSBMU03165",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
},
{
"name": "SSRT101816",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"name": "39918",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/39918/"
},
{
"name": "HPSBHF03119",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2"
},
{
"name": "RHSA-2014:1295",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html"
},
{
"name": "openSUSE-SU-2014:1226",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts"
},
{
"name": "HPSBST03131",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2"
},
{
"name": "SSRT101819",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded"
},
{
"name": "HPSBMU03245",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
},
{
"name": "HPSBST03196",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"name": "61188",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61188"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
},
{
"name": "JVN#55667175",
"tags": [
"third-party-advisory",
"x_refsource_JVN",
"x_transferred"
],
"url": "http://jvn.jp/en/jp/JVN55667175/index.html"
},
{
"name": "61676",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61676"
},
{
"name": "40619",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/40619/"
},
{
"name": "openSUSE-SU-2014:1254",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html"
},
{
"name": "60433",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60433"
},
{
"name": "38849",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/38849/"
},
{
"name": "HPSBMU03143",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
},
{
"name": "HPSBMU03182",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"name": "SUSE-SU-2014:1260",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html"
},
{
"name": "HPSBST03155",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
},
{
"name": "61715",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61715"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
},
{
"name": "61816",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61816"
},
{
"name": "openSUSE-SU-2014:1310",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
},
{
"name": "61442",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61442"
},
{
"name": "HPSBMU03246",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
},
{
"name": "HPSBST03195",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2"
},
{
"name": "61283",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61283"
},
{
"name": "SSRT101711",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"name": "USN-2362-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/USN-2362-1"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085"
},
{
"name": "openSUSE-SU-2014:1308",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html"
},
{
"name": "61654",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61654"
},
{
"name": "61542",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61542"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015701"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315"
},
{
"name": "62312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62312"
},
{
"name": "59272",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/59272"
},
{
"name": "HPSBST03122",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"name": "HPSBMU03217",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
},
{
"name": "SSRT101868",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "61703",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61703"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.apple.com/kb/HT6495"
},
{
"name": "VU#252743",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"name": "61065",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61065"
},
{
"name": "SUSE-SU-2014:1213",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html"
},
{
"name": "HPSBST03129",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
},
{
"name": "HPSBMU03144",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
},
{
"name": "70103",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/70103"
},
{
"name": "JVNDB-2014-000126",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB",
"x_transferred"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126"
},
{
"name": "SSRT101827",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"name": "TA14-268A",
"tags": [
"third-party-advisory",
"x_refsource_CERT",
"x_transferred"
],
"url": "http://www.us-cert.gov/ncas/alerts/TA14-268A"
},
{
"name": "SUSE-SU-2014:1212",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html"
},
{
"name": "61641",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61641"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://access.redhat.com/node/1200223"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html"
},
{
"name": "SUSE-SU-2014:1287",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898"
},
{
"name": "APPLE-SA-2014-10-16-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
},
{
"name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_FULLDISC",
"x_transferred"
],
"url": "http://seclists.org/fulldisclosure/2014/Oct/0"
},
{
"name": "MDVSA-2015:164",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164"
},
{
"name": "RHSA-2014:1293",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075"
},
{
"name": "openSUSE-SU-2014:1238",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html"
},
{
"name": "HPSBMU03220",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"name": "60325",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60325"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "60024",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60024"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html"
},
{
"name": "34879",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/34879/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://access.redhat.com/articles/1200223"
},
{
"name": "62343",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62343"
},
{
"name": "61565",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61565"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.suse.com/support/shellshock/"
},
{
"name": "HPSBST03157",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
},
{
"name": "61313",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61313"
},
{
"name": "SSRT101742",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"name": "61873",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61873"
},
{
"name": "61485",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61485"
},
{
"name": "60947",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60947"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.apple.com/kb/HT6535"
},
{
"name": "HPSBST03154",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
},
{
"name": "HPSBST03265",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272"
},
{
"name": "HPSBGN03142",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
},
{
"name": "61312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61312"
},
{
"name": "60193",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60193"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1294.html"
},
{
"name": "60063",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60063"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html"
},
{
"name": "60034",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60034"
},
{
"name": "HPSBMU03133",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
},
{
"name": "59907",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/59907"
},
{
"name": "58200",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/58200"
},
{
"name": "HPSBST03181",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
},
{
"name": "61643",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61643"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015721"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
},
{
"name": "61503",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61503"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
},
{
"name": "RHSA-2014:1354",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html"
},
{
"name": "40938",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/40938/"
},
{
"name": "HPSBGN03117",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.novell.com/security/cve/CVE-2014-6271.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915"
},
{
"name": "61547",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61547"
},
{
"name": "HPSBHF03145",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
},
{
"name": "HPSBST03148",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2"
},
{
"name": "61552",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61552"
},
{
"name": "61780",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61780"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX200223"
},
{
"name": "DSA-3032",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447"
},
{
"name": "62228",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/62228"
},
{
"name": "HPSBGN03138",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
},
{
"name": "61855",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61855"
},
{
"name": "HPSBHF03124",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2"
},
{
"name": "60044",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60044"
},
{
"name": "61291",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61291"
},
{
"name": "RHSA-2014:1294",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html"
},
{
"name": "HPSBHF03125",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
},
{
"name": "59737",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/59737"
},
{
"name": "61287",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61287"
},
{
"name": "HPSBHF03146",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
},
{
"name": "HPSBGN03233",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"name": "SSRT101739",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "61711",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61711"
},
{
"name": "HPSBOV03228",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361"
},
{
"name": "HPSBGN03141",
"tags": [
"vendor-advisory",
"x_refsource_HP",
"x_transferred"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://advisories.mageia.org/MGASA-2014-0388.html"
},
{
"name": "61128",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61128"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.citrix.com/article/CTX200217"
},
{
"name": "61471",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61471"
},
{
"name": "60055",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/60055"
},
{
"name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash"
},
{
"name": "61550",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61550"
},
{
"name": "61633",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61633"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1293.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
},
{
"name": "61328",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61328"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
},
{
"name": "42938",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/42938/"
},
{
"name": "61129",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61129"
},
{
"name": "61700",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61700"
},
{
"name": "61603",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61603"
},
{
"name": "61857",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/61857"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2014-6271",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-07T13:45:49.549420Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2022-01-28",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6271"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-22T00:05:36.342Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6271"
}
],
"timeline": [
{
"lang": "en",
"time": "2022-01-28T00:00:00+00:00",
"value": "CVE-2014-6271 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2014-09-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-11-05T16:37:05.000Z",
"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"shortName": "debian"
},
"references": [
{
"name": "37816",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/37816/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html"
},
{
"name": "SUSE-SU-2014:1223",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
},
{
"name": "HPSBMU03165",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
},
{
"name": "SSRT101816",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"name": "39918",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/39918/"
},
{
"name": "HPSBHF03119",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2"
},
{
"name": "RHSA-2014:1295",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html"
},
{
"name": "openSUSE-SU-2014:1226",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts"
},
{
"name": "HPSBST03131",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2"
},
{
"name": "SSRT101819",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded"
},
{
"name": "HPSBMU03245",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
},
{
"name": "HPSBST03196",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"name": "61188",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61188"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
},
{
"name": "JVN#55667175",
"tags": [
"third-party-advisory",
"x_refsource_JVN"
],
"url": "http://jvn.jp/en/jp/JVN55667175/index.html"
},
{
"name": "61676",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61676"
},
{
"name": "40619",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/40619/"
},
{
"name": "openSUSE-SU-2014:1254",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html"
},
{
"name": "60433",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60433"
},
{
"name": "38849",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/38849/"
},
{
"name": "HPSBMU03143",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
},
{
"name": "HPSBMU03182",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"name": "SUSE-SU-2014:1260",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html"
},
{
"name": "HPSBST03155",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
},
{
"name": "61715",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61715"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
},
{
"name": "61816",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61816"
},
{
"name": "openSUSE-SU-2014:1310",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
},
{
"name": "61442",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61442"
},
{
"name": "HPSBMU03246",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
},
{
"name": "HPSBST03195",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2"
},
{
"name": "61283",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61283"
},
{
"name": "SSRT101711",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"name": "USN-2362-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/USN-2362-1"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085"
},
{
"name": "openSUSE-SU-2014:1308",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html"
},
{
"name": "61654",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61654"
},
{
"name": "61542",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61542"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015701"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315"
},
{
"name": "62312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62312"
},
{
"name": "59272",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/59272"
},
{
"name": "HPSBST03122",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"name": "HPSBMU03217",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
},
{
"name": "SSRT101868",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "61703",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61703"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.apple.com/kb/HT6495"
},
{
"name": "VU#252743",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"name": "61065",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61065"
},
{
"name": "SUSE-SU-2014:1213",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html"
},
{
"name": "HPSBST03129",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
},
{
"name": "HPSBMU03144",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
},
{
"name": "70103",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/70103"
},
{
"name": "JVNDB-2014-000126",
"tags": [
"third-party-advisory",
"x_refsource_JVNDB"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126"
},
{
"name": "SSRT101827",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"name": "TA14-268A",
"tags": [
"third-party-advisory",
"x_refsource_CERT"
],
"url": "http://www.us-cert.gov/ncas/alerts/TA14-268A"
},
{
"name": "SUSE-SU-2014:1212",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html"
},
{
"name": "61641",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61641"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://access.redhat.com/node/1200223"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html"
},
{
"name": "SUSE-SU-2014:1287",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898"
},
{
"name": "APPLE-SA-2014-10-16-1",
"tags": [
"vendor-advisory",
"x_refsource_APPLE"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
},
{
"name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_FULLDISC"
],
"url": "http://seclists.org/fulldisclosure/2014/Oct/0"
},
{
"name": "MDVSA-2015:164",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164"
},
{
"name": "RHSA-2014:1293",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075"
},
{
"name": "openSUSE-SU-2014:1238",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html"
},
{
"name": "HPSBMU03220",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"name": "60325",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60325"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "60024",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60024"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html"
},
{
"name": "34879",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/34879/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://access.redhat.com/articles/1200223"
},
{
"name": "62343",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62343"
},
{
"name": "61565",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61565"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.suse.com/support/shellshock/"
},
{
"name": "HPSBST03157",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
},
{
"name": "61313",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61313"
},
{
"name": "SSRT101742",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"name": "61873",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61873"
},
{
"name": "61485",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61485"
},
{
"name": "60947",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60947"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.apple.com/kb/HT6535"
},
{
"name": "HPSBST03154",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
},
{
"name": "HPSBST03265",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272"
},
{
"name": "HPSBGN03142",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
},
{
"name": "61312",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61312"
},
{
"name": "60193",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60193"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1294.html"
},
{
"name": "60063",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60063"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html"
},
{
"name": "60034",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60034"
},
{
"name": "HPSBMU03133",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
},
{
"name": "59907",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/59907"
},
{
"name": "58200",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/58200"
},
{
"name": "HPSBST03181",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
},
{
"name": "61643",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61643"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015721"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
},
{
"name": "61503",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61503"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
},
{
"name": "RHSA-2014:1354",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html"
},
{
"name": "40938",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/40938/"
},
{
"name": "HPSBGN03117",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.novell.com/security/cve/CVE-2014-6271.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915"
},
{
"name": "61547",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61547"
},
{
"name": "HPSBHF03145",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
},
{
"name": "HPSBST03148",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2"
},
{
"name": "61552",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61552"
},
{
"name": "61780",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61780"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.citrix.com/article/CTX200223"
},
{
"name": "DSA-3032",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447"
},
{
"name": "62228",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/62228"
},
{
"name": "HPSBGN03138",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
},
{
"name": "61855",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61855"
},
{
"name": "HPSBHF03124",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2"
},
{
"name": "60044",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60044"
},
{
"name": "61291",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61291"
},
{
"name": "RHSA-2014:1294",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html"
},
{
"name": "HPSBHF03125",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
},
{
"name": "59737",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/59737"
},
{
"name": "61287",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61287"
},
{
"name": "HPSBHF03146",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
},
{
"name": "HPSBGN03233",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"name": "SSRT101739",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "61711",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61711"
},
{
"name": "HPSBOV03228",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361"
},
{
"name": "HPSBGN03141",
"tags": [
"vendor-advisory",
"x_refsource_HP"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://advisories.mageia.org/MGASA-2014-0388.html"
},
{
"name": "61128",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61128"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.citrix.com/article/CTX200217"
},
{
"name": "61471",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61471"
},
{
"name": "60055",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/60055"
},
{
"name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash"
},
{
"name": "61550",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61550"
},
{
"name": "61633",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61633"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1293.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
},
{
"name": "61328",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61328"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
},
{
"name": "42938",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/42938/"
},
{
"name": "61129",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61129"
},
{
"name": "61700",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61700"
},
{
"name": "61603",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61603"
},
{
"name": "61857",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/61857"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2014-6271",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37816",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37816/"
},
{
"name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html"
},
{
"name": "SUSE-SU-2014:1223",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
},
{
"name": "HPSBMU03165",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
},
{
"name": "SSRT101816",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"name": "39918",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39918/"
},
{
"name": "HPSBHF03119",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2"
},
{
"name": "RHSA-2014:1295",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html"
},
{
"name": "openSUSE-SU-2014:1226",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html"
},
{
"name": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/",
"refsource": "CONFIRM",
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
},
{
"name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts",
"refsource": "CONFIRM",
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts"
},
{
"name": "HPSBST03131",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2"
},
{
"name": "SSRT101819",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded"
},
{
"name": "HPSBMU03245",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
},
{
"name": "HPSBST03196",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"name": "61188",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61188"
},
{
"name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
"refsource": "CONFIRM",
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
},
{
"name": "JVN#55667175",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN55667175/index.html"
},
{
"name": "61676",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61676"
},
{
"name": "40619",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40619/"
},
{
"name": "openSUSE-SU-2014:1254",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html"
},
{
"name": "60433",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60433"
},
{
"name": "38849",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38849/"
},
{
"name": "HPSBMU03143",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
},
{
"name": "HPSBMU03182",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"name": "SUSE-SU-2014:1260",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html"
},
{
"name": "HPSBST03155",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
},
{
"name": "61715",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61715"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
},
{
"name": "61816",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61816"
},
{
"name": "openSUSE-SU-2014:1310",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
},
{
"name": "61442",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61442"
},
{
"name": "HPSBMU03246",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
},
{
"name": "HPSBST03195",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2"
},
{
"name": "61283",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61283"
},
{
"name": "SSRT101711",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"name": "USN-2362-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2362-1"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085"
},
{
"name": "openSUSE-SU-2014:1308",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html"
},
{
"name": "61654",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61654"
},
{
"name": "61542",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61542"
},
{
"name": "http://www.novell.com/support/kb/doc.php?id=7015701",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/kb/doc.php?id=7015701"
},
{
"name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315",
"refsource": "CONFIRM",
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315"
},
{
"name": "62312",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62312"
},
{
"name": "59272",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59272"
},
{
"name": "HPSBST03122",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2"
},
{
"name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html",
"refsource": "CONFIRM",
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"name": "HPSBMU03217",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
},
{
"name": "SSRT101868",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "61703",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61703"
},
{
"name": "http://support.apple.com/kb/HT6495",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6495"
},
{
"name": "VU#252743",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"name": "61065",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61065"
},
{
"name": "SUSE-SU-2014:1213",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html"
},
{
"name": "HPSBST03129",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
},
{
"name": "HPSBMU03144",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
},
{
"name": "70103",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70103"
},
{
"name": "JVNDB-2014-000126",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126"
},
{
"name": "SSRT101827",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"name": "TA14-268A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA14-268A"
},
{
"name": "SUSE-SU-2014:1212",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html"
},
{
"name": "61641",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61641"
},
{
"name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648"
},
{
"name": "https://access.redhat.com/node/1200223",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/node/1200223"
},
{
"name": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html"
},
{
"name": "SUSE-SU-2014:1287",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898"
},
{
"name": "APPLE-SA-2014-10-16-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
},
{
"name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Oct/0"
},
{
"name": "MDVSA-2015:164",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164"
},
{
"name": "RHSA-2014:1293",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075"
},
{
"name": "openSUSE-SU-2014:1238",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html"
},
{
"name": "HPSBMU03220",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"name": "60325",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60325"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "60024",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60024"
},
{
"name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html"
},
{
"name": "34879",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/34879/"
},
{
"name": "https://access.redhat.com/articles/1200223",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/articles/1200223"
},
{
"name": "62343",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62343"
},
{
"name": "61565",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61565"
},
{
"name": "https://www.suse.com/support/shellshock/",
"refsource": "CONFIRM",
"url": "https://www.suse.com/support/shellshock/"
},
{
"name": "HPSBST03157",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
},
{
"name": "61313",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61313"
},
{
"name": "SSRT101742",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"name": "61873",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61873"
},
{
"name": "61485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61485"
},
{
"name": "60947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60947"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183"
},
{
"name": "https://support.apple.com/kb/HT6535",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6535"
},
{
"name": "HPSBST03154",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
},
{
"name": "HPSBST03265",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272"
},
{
"name": "HPSBGN03142",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
},
{
"name": "61312",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61312"
},
{
"name": "60193",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60193"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1294.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-1294.html"
},
{
"name": "60063",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60063"
},
{
"name": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html"
},
{
"name": "60034",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60034"
},
{
"name": "HPSBMU03133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2"
},
{
"name": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html",
"refsource": "MISC",
"url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
},
{
"name": "59907",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59907"
},
{
"name": "58200",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58200"
},
{
"name": "HPSBST03181",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
},
{
"name": "61643",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61643"
},
{
"name": "http://www.novell.com/support/kb/doc.php?id=7015721",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/kb/doc.php?id=7015721"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
},
{
"name": "61503",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61503"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
},
{
"name": "RHSA-2014:1354",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html"
},
{
"name": "40938",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40938/"
},
{
"name": "HPSBGN03117",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2"
},
{
"name": "http://support.novell.com/security/cve/CVE-2014-6271.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/security/cve/CVE-2014-6271.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915"
},
{
"name": "61547",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61547"
},
{
"name": "HPSBHF03145",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
},
{
"name": "http://www.qnap.com/i/en/support/con_show.php?cid=61",
"refsource": "CONFIRM",
"url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
},
{
"name": "HPSBST03148",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2"
},
{
"name": "61552",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61552"
},
{
"name": "61780",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61780"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279"
},
{
"name": "https://support.citrix.com/article/CTX200223",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX200223"
},
{
"name": "DSA-3032",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447"
},
{
"name": "62228",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62228"
},
{
"name": "HPSBGN03138",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
},
{
"name": "61855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61855"
},
{
"name": "HPSBHF03124",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2"
},
{
"name": "60044",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60044"
},
{
"name": "61291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61291"
},
{
"name": "RHSA-2014:1294",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html"
},
{
"name": "HPSBHF03125",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
},
{
"name": "59737",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59737"
},
{
"name": "61287",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61287"
},
{
"name": "HPSBHF03146",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
},
{
"name": "HPSBGN03233",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"name": "SSRT101739",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "61711",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61711"
},
{
"name": "HPSBOV03228",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361"
},
{
"name": "HPSBGN03141",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0388.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0388.html"
},
{
"name": "61128",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61128"
},
{
"name": "https://support.citrix.com/article/CTX200217",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX200217"
},
{
"name": "61471",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61471"
},
{
"name": "60055",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60055"
},
{
"name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash"
},
{
"name": "61550",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61550"
},
{
"name": "61633",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61633"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1293.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-1293.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
},
{
"name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82",
"refsource": "CONFIRM",
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
},
{
"name": "61328",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61328"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
},
{
"name": "42938",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42938/"
},
{
"name": "61129",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61129"
},
{
"name": "61700",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61700"
},
{
"name": "61603",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61603"
},
{
"name": "61857",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61857"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"name": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
},
{
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006",
"refsource": "MISC",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5",
"assignerShortName": "debian",
"cveId": "CVE-2014-6271",
"datePublished": "2014-09-24T18:00:00.000Z",
"dateReserved": "2014-09-09T00:00:00.000Z",
"dateUpdated": "2025-10-22T00:05:36.342Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2014-6271",
"cwes": "[\"CWE-78\"]",
"dateAdded": "2022-01-28",
"dueDate": "2022-07-28",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271",
"product": "Bourne-Again Shell (Bash)",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code.",
"vendorProject": "GNU",
"vulnerabilityName": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2014-6271\",\"sourceIdentifier\":\"security@debian.org\",\"published\":\"2014-09-24T18:48:04.477\",\"lastModified\":\"2025-10-22T01:15:57.643\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \\\"ShellShock.\\\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.\"},{\"lang\":\"es\",\"value\":\"GNU Bash hasta la versi\u00f3n 4.3 procesa cadenas finales despu\u00e9s de las definiciones de funciones en los valores de variables de entorno, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un entorno manipulado, tal como se ha demostrado por vectores que involucran la caracter\u00edstica ForceCommand en sshd OpenSSH, los m\u00f3dulos mod_cgi y mod_cgid en el Apache HTTP Server, scripts ejecutados por clientes DHCP no especificados, y otras situaciones en las cuales el ajuste de entorno ocurre a trav\u00e9s de un l\u00edmite privilegiado de la ejecuci\u00f3n de Bash, tambi\u00e9n conocido como \\\"ShellShock.\\\" NOTA: la reparaci\u00f3n original para este problema era incorrecta; CVE-2014-7169 ha sido asignada para cubrir la vulnerabilidad que todav\u00eda est\u00e1 presente despu\u00e9s de la soluci\u00f3n incorrecta.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-01-28\",\"cisaActionDue\":\"2022-07-28\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.3\",\"matchCriteriaId\":\"F4DBE402-1B0A-4854-ABE5-891321454C25\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.9.0\",\"versionEndExcluding\":\"4.9.12\",\"matchCriteriaId\":\"DCA5A28D-79B6-4F3E-9C98-65D4DFAD8EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.10.0\",\"versionEndExcluding\":\"4.10.9\",\"matchCriteriaId\":\"9B1DC7EF-C994-4252-9DFE-DCA63FB17AE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.11.0\",\"versionEndExcluding\":\"4.11.11\",\"matchCriteriaId\":\"9056776F-03F6-4C3D-8635-37D66FD16EAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.12.0\",\"versionEndExcluding\":\"4.12.9\",\"matchCriteriaId\":\"AFEE6963-F73F-4B71-B4F8-6E550FBDA5F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.13.0\",\"versionEndExcluding\":\"4.13.9\",\"matchCriteriaId\":\"8296875A-64FA-4592-848A-A923126BD8AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.14.0\",\"versionEndExcluding\":\"4.14.4f\",\"matchCriteriaId\":\"816A16AF-1F5E-483A-AA89-3022818FAE43\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8421899-5D10-4C2B-88AA-3DA909FE3E67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"62A2AC02-A933-4E51-810E-5D040B476B7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7B037A8-72A6-4DFF-94B2-D688A5F6F876\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.1.1\",\"matchCriteriaId\":\"BE8B7F1F-22F6-4B10-A6E5-DE44B1D2E649\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F407EA72-BA1A-41A2-B699-874304A638A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:qnap:qts:4.1.1:build_0927:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDA25903-B334-438B-8196-B9E5119199D1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76F1E356-E019-47E8-AA5F-702DA93CF74E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F805A106-9A6F-48E7-8582-D3C5A26DFC11\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC489F35-07F1-4C3E-80B9-78F0689BC54B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95CE35FC-266F-4025-A0B8-FB853C020800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6172AF57-B26D-45F8-BE3A-F75ABDF28F49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D8B549B-E57B-4DFE-8A13-CAB06B5356B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133AAFA7-AF42-4D7B-8822-AA2E85611BF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6252E88C-27FF-420D-A64A-C34124CF7E6A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A8E07B7-3739-4BEB-88F8-C7F62431E889\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"569964DA-31BE-4520-A66D-C3B09D557AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"807C024A-F8E8-4B48-A349-4C68CD252CA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F96E3779-F56A-45FF-BB3D-4980527D721E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CF73560-2F5B-4723-A8A1-9AADBB3ADA00\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BF3C7A5-9117-42C7-BEA1-4AA378A582EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83737173-E12E-4641-BC49-0BD84A6B29D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC5537E1-1E8E-49C5-B4CB-A8E2EE3F5088\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"804DFF9F-BAA8-4239-835B-6182471A224F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EE496C0-35F7-44DC-B3F0-71EA3A613C38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71179893-49F2-433C-A7AC-687075F9CC1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D4C43D8-02A5-4385-A89E-F265FEEC9E9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37ECC029-3D84-4DD7-B28B-E5AD5559CF94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CBED2A-B6B0-420E-BC40-160930D8662E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"652F7BB0-A6EA-45D0-86D4-49F4CA6C3EE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29BBF1AC-F31F-4251-8054-0D89A8E6E990\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C52A4A2F-6385-4E5F-B2C7-0EF7267546F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D8D654F-2442-4EA0-AF89-6AC2CD214772\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8ED0658-5F8F-48F0-A605-A2205DA27DA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BCF87FD-9358-42A5-9917-25DF0180A5A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C385DA76-4863-4D39-84D2-9D185D322365\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"188019BF-3700-4B3F-BFA5-553B2B545B7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B8B2E32-B838-4E51-BAA2-764089D2A684\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4319B943-7B19-468D-A160-5895F7F997A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39C1ABF5-4070-4AA7-BAB8-4F63E1BD91FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8036E2AE-4E44-4FA5-AFFB-A3724BFDD654\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"634C23AC-AC9C-43F4-BED8-1C720816D5E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37CE1DC7-72C5-483C-8921-0B462C8284D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54D669D4-6D7E-449D-80C1-28FA44F06FFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB6ADFB8-210D-4E46-82A2-1C8705928382\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92C9F1C4-55B0-426D-BB5E-01372C23AF97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD6D0378-F0F4-4AAA-80AF-8287C790EC96\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF83BB87-B203-48F9-9D06-48A5FE399050\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8821E5FE-319D-40AB-A515-D56C1893E6F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AE981D4-0CA1-46FA-8E91-E1A4D5B31383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F732C7C9-A9CC-4DEF-A8BE-D0F18C944C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"835AE071-CEAE-49E5-8F0C-E5F50FB85EFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0AC5CD5-6E58-433C-9EB3-6DFE5656463E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74BCA435-7594-49E8-9BAE-9E02E129B6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFBF430B-0832-44B0-AA0E-BA9E467F7668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10BC294-9196-425F-9FB0-B1625465B47F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03117DF1-3BEC-4B8D-AD63-DBBDB2126081\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ED68ADD-BBDA-4485-BC76-58F011D72311\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"CED02712-1031-4206-AC4D-E68710F46EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"35BBD83D-BDC7-4678-BE94-639F59281139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*\",\"matchCriteriaId\":\"7F4AF9EC-7C74-40C3-A1BA-82B80C4A7EE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*\",\"matchCriteriaId\":\"CB6476C7-03F2-4939-AB85-69AA524516D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*\",\"matchCriteriaId\":\"E534C201-BCC5-473C-AAA7-AAB97CEB5437\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*\",\"matchCriteriaId\":\"2470C6E8-2024-4CF5-9982-CFF50E88EAE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"15FC9014-BD85-4382-9D04-C0703E901D7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F7F8866-DEAD-44D1-AB10-21EE611AA026\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1831D45A-EE6E-4220-8F8C-248B69520948\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"94C9C346-6DEC-4C72-9F59-BB3BEC42B551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2071DABB-7102-47F2-A15F-A6C03607D01F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8661E86-E075-427F-8E05-7A33811A3A76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.0.0.0\",\"versionEndIncluding\":\"1.0.0.4\",\"matchCriteriaId\":\"BEFCC35D-1C83-4CA5-8B1D-9A637613AD7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0.0\",\"versionEndIncluding\":\"1.1.0.4\",\"matchCriteriaId\":\"054736AF-96E0-491D-B824-CC4A35B76E14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"575894EE-F13C-4D56-8B63-59A379F63BD2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E476AEB-AD38-4033-8426-DC502497D75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C062C89-5DC2-46EE-A9D3-23E7539A5DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr1:*:*:*:*:*:*\",\"matchCriteriaId\":\"20981443-6A64-4852-B2CB-3299927C6F78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr2:*:*:*:*:*:*\",\"matchCriteriaId\":\"59761BB8-FCC7-4D15-88A8-82076CCF196F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF399B2E-8413-4B80-A0C0-E61E8A0A8604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"230EBA53-66AF-432B-B4C1-08D8FC903B2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"789F398A-5CB2-48F8-AF8F-05BF0A8E04B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF102659-B067-473E-AA37-EA90A82D1864\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DF915D-D764-4C21-B213-0ADFD844E9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C29A4119-A992-4713-85D6-4FDED7CD416A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CA59C9D-74C2-4AFC-B1D1-1BC305FD493B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p11:*:*:*:*:*:*\",\"matchCriteriaId\":\"5720A37E-1DB5-45BA-9FDE-0EAEFE1F2257\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p12:*:*:*:*:*:*\",\"matchCriteriaId\":\"F03006B7-037B-491F-A09F-DEB2FF076754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p13:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE78AED4-AD60-406C-82E0-BA52701B49BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D0B71F0-CCED-4E23-989A-3E9E2D71307C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CF8FC22-C556-451C-B928-F5AF8DF4BF45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"081D3B14-45F6-4F96-944B-94D967FEFA26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE2C36B5-43F8-401B-B420-1FA5F13A4D6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"D922DC5A-63F6-4188-BCDE-BB987402E47E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFD5737C-AAE8-4C8D-BCFE-FFDF5DA4221C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2BCC22C-A32B-4945-AFBC-777DBE248FB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"92F92890-63B0-4918-A147-8852B6E2FA8A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8016ECD3-4417-47A8-9493-C9F9EDF5FAA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED0B143A-5386-4375-AEB2-48619B2B1EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7ECA734-9E95-484F-B880-2491A0E2531B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D7CD9E9-033C-44B8-A68C-47AC260873E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B660DC-A94F-48F0-A2F4-1C39CC4751A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"44D355AE-A8C0-4D7B-87FE-5D4138B6BB2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"329C8551-98D1-4255-B598-9E75A071C186\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD0687B7-F374-4368-AD9E-041123B23A6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0330E77-454E-4E77-9628-50681B748491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3863726E-15AD-4A47-85CB-0C9965E76EF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C07D9DC-E6C1-4FB0-86F1-144FD51B08CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3105129C-8FE8-4BF0-8CB9-A7F3F7FE1107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1F35447-889F-4CE9-9473-87046B4707EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A5DFC0-BBD7-430C-A026-E1F34E08894D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"141E8F6A-3998-4F22-A717-3F52BC998F97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F09AA197-BB55-4CF0-AC29-4449C07DE510\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E468E33-B183-4830-97E2-EAF9FD3758E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"738C8F2B-3D3E-4E1F-977A-05D3A39F115D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ED03E83-909B-423F-81F2-34AB7F24BBE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"9778E8AA-A034-4B04-A42E-6A182378C7DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEE15598-4064-4E31-86BA-7851AA4B76C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"59FE3789-FB47-4939-B9AA-86D203445526\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F96389A-82B9-42DE-8E93-D2B2EE610F7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"3131CDA5-1C4D-489C-8788-FA396F8ADB2C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCC7DF3E-658C-41D7-A4AC-433440A02092\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEBB12B8-4EF6-42B9-9D28-A9CA129B0FBA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"279C30FB-EA1C-4D1D-A37E-F1EEF79F19F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6870C1E-E4A4-4666-89DB-D72C8100D27E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE183CA0-FFBB-4746-8BBE-5D1910DD2100\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D04B5EBF-C94C-4A44-9A7E-75623CAF832C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5723FDF4-198B-488E-B075-F528EC6E4D18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E23A972-5BCA-4C7E-B6F9-AD54992861A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D00AFC9-8A9C-4BB1-9E60-BC6D552DC8E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFE4D0FF-6445-4E14-9536-ADB32662B346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7FC4FDA-1C8D-4D7A-B5EA-D905FA830805\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"753AA0F3-09F4-4E34-8E72-FAFD8BFE18EC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9AC763FD-C143-4CA3-9A24-D50C9ED243D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"299C6CBE-905F-4E59-AF2F-89A1CD767916\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"78538461-1B7E-4712-AA8D-D2EA3477635B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3FF46F1-EF19-49D7-9EDD-44441C1A3F94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9F91FB6-7D8F-4D89-B6BA-2C6DF15B9A51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5725106C-A650-4C24-9636-1200BD44CCA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1501425-96F7-487B-9588-FDA2DAC3790A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"48D95998-9434-4AFF-9983-0D7AC34176A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D60BB309-860D-4D74-B08F-F94AFE84C881\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"F63E864E-6323-41B4-956F-51F9364DFAE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC724282-7431-465E-8E60-4037121B8838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"73151221-C102-4425-9316-1EE4CAAB6531\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1E9DDCD-6D22-4175-94EF-D8A5457E7355\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*\",\"matchCriteriaId\":\"35AB906F-43CD-4D54-8274-1FD551532E58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p12:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADC75F0-B27E-4B15-B829-482FBA0063A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p13:*:*:*:*:*:*\",\"matchCriteriaId\":\"D015D670-8AEA-49A3-8D22-9E3009322EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p14:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18F3CC3-9BCF-4DE8-B7CA-59587D5E61F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p15:*:*:*:*:*:*\",\"matchCriteriaId\":\"E543BC0F-ADFB-4CF2-BC6C-90DC76BE3A95\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p16:*:*:*:*:*:*\",\"matchCriteriaId\":\"28CE650B-BE03-4EDF-BE27-2FA6657F7A52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2356A4E6-561B-40CA-8348-B30D581B1E46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"74509F3F-840E-48B8-88B1-EA4FFB90ACC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE7BD528-628F-4CA9-9FE8-8A79BDC97680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"26118C2B-78CC-4038-9DEA-7A9417029790\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"29EBC1DD-6949-4B12-8CA5-EE2BCDB8C4C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F445D93-D482-4A74-810D-66D78CBCAFED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C9F200C-ECC9-4D51-AFE7-E99C16D09148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B87CB5-0F77-4040-BB58-9DBF5723A4FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4B3321B-11AD-43EB-867C-FA4FA6A5421E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB104CA-55CD-4B9E-A2F7-CC06E57663CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4975223D-9E31-4CEC-A4B6-C0996828B855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E0F4A7-B8BD-42D1-92DB-2B510FFC9C36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C15C820B-4778-4B8F-8BD8-E996F1D4062D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A42E70EE-2E23-4D92-ADE0-9177B9EDD430\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01C91446-4A36-4FCE-A973-3E6F813FABC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"58281E62-E350-4B0D-9322-8BA1E1773CB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF1A152E-5795-4319-BD4D-855DE19C744C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"438FCE7F-035A-4D89-96FE-EE5278C85493\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"80900F2C-7CFA-4C40-A6B5-51E12C3DA187\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDE9A060-1D4D-46E5-A34F-CC4CFA260D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"33F900E6-AE47-4789-A337-70C6BEF22895\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD2E5054-2151-414D-A88F-6697FF280D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EB09361-372E-4F51-B255-C7D2DB41969F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A36D6991-3728-4F60-A443-37652DFAA053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p10:*:*:*:*:*:*\",\"matchCriteriaId\":\"4142CC4E-9F0D-4017-8D17-D59FBCEB36F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p11:*:*:*:*:*:*\",\"matchCriteriaId\":\"63C0F7CA-5F3C-41D4-AAD6-084643115D85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p12:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D16C66D-15BF-4EB8-8D78-DF12A69BD7F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p13:*:*:*:*:*:*\",\"matchCriteriaId\":\"81C388DC-0941-4D08-8C1C-BD43D9B0DC8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p14:*:*:*:*:*:*\",\"matchCriteriaId\":\"45CD14D8-665A-46C5-8387-33FF266822A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p15:*:*:*:*:*:*\",\"matchCriteriaId\":\"D510329D-B39E-4E2B-AAEC-1FDA7869C9E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p16:*:*:*:*:*:*\",\"matchCriteriaId\":\"4640FE06-4D22-442E-A0E0-76EEFAF6ECB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p17:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A846C69-CA94-4F5E-9E02-69EA6680549E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E63ECF-25CB-4E7F-BF51-B4D7B3541AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p3:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF14DD4F-6779-4B17-AB1B-D4DE58E7E231\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p4:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AAEE176-631A-41B9-BC40-93F866DA9D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"75C963D5-F2D1-49EE-93B5-CA7FE7EAB98C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"9388D932-9818-4A68-9543-B0643166DB2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p7:*:*:*:*:*:*\",\"matchCriteriaId\":\"770A9287-C910-4690-9402-0C0B7BAC8912\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p8:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F8AC068-D5AC-4042-8A7C-5B95EA0E85F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p9:*:*:*:*:*:*\",\"matchCriteriaId\":\"B503F1F7-F439-420D-B465-9A51CCECAB06\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27948B08-C452-41FB-B41F-6ADB3AAE087E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AB8FB4C-5BBC-420D-84F0-C8424DC25CD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF1F14C-DB2C-40A8-B899-C127C7ECC0D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E87FA9CC-D201-430F-8FE6-8C9A88CEAB1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D7F2743-71BB-4011-B919-7E8032B6B72F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:kvm:*:*:*\",\"versionEndExcluding\":\"1.2.1\",\"matchCriteriaId\":\"3738FAC6-B90B-4014-9E86-17ED6D19D23D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:openflow:*:*:*\",\"versionEndExcluding\":\"1.2.1\",\"matchCriteriaId\":\"35B6634E-4F09-423C-87E7-59D4127CC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:vmware:*:*:*\",\"versionEndExcluding\":\"1.2.1\",\"matchCriteriaId\":\"0A7A7100-A1DA-4191-A4C1-D930829A3DC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83739ED7-37F1-4712-8C81-E56F58790240\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ibm:workload_deployer:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.1.0\",\"versionEndIncluding\":\"3.1.0.7\",\"matchCriteriaId\":\"1CDD227E-1F98-4F73-BB65-3820F39127F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA4B8E11-83D3-4B38-90B6-4C0F536D06B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFD6FF12-A3AD-4D2B-92EB-44D20AF4DD9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD7C3FED-3B2F-4EC9-9A9B-05EFDB0AA56B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"250AF7A4-8DDF-427C-8BF7-788667908D77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22433CE0-9772-48CE-8069-612FF3732C21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2569AA28-5C61-4BBD-A501-E1ACFA36837B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79AFD6BE-4ED1-4A9C-AF30-F083A7A4F418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB188A2-D7CE-4141-A55A-C074C84E366E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DE776097-1DA4-4F27-8E96-61E3D9FFE8D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE4E5283-0FEE-4F37-9C41-FA695063FF79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39D9B9CF-5F3D-4CA3-87A0-AAE1BA5F09C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73EB6121-62CD-49FC-A1D2-5467B007253C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97E19969-DD73-42F2-9E91-504E1663B268\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9CC2E05-5179-4241-A710-E582510EEB0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD1366C8-9C78-4B40-8E40-19C4DFEC2B1D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0.0\",\"versionEndExcluding\":\"1.4.3.5\",\"matchCriteriaId\":\"3CB18F38-AC6A-406A-A4DD-40688B803744\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.5.0.0\",\"versionEndExcluding\":\"1.5.0.4\",\"matchCriteriaId\":\"DFE781C8-40F7-4F6D-8FED-8EB3071FE9DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0.0\",\"versionEndExcluding\":\"7.2.0.9\",\"matchCriteriaId\":\"A5AB3395-B458-49F8-A8E3-25FF0C1C3BD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.3.0.0\",\"versionEndExcluding\":\"7.3.0.7\",\"matchCriteriaId\":\"1EC57FAE-AD4D-4C9F-97A4-581C977B5FE4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA2ED020-4C7B-4303-ABE6-74D46D127556\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0.0\",\"versionEndExcluding\":\"7.1.0.11\",\"matchCriteriaId\":\"47A17EE0-7D3E-4CD7-984C-BB17BF6F4BFD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0.0\",\"versionEndExcluding\":\"7.2.0.9\",\"matchCriteriaId\":\"33A46CF2-392A-4BB9-B4BF-DE8C5228CAAE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.3.0.0\",\"versionEndExcluding\":\"7.3.0.7\",\"matchCriteriaId\":\"9C4EF774-BD92-444D-9583-25DB97CDA4F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0.0\",\"versionEndExcluding\":\"7.1.0.11\",\"matchCriteriaId\":\"8753BBDB-A858-4A51-A8FD-8DF8DF2734A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0.0\",\"versionEndExcluding\":\"7.2.0.9\",\"matchCriteriaId\":\"0FB9850A-3308-4277-A68C-AD418612101E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.3.0.0\",\"versionEndExcluding\":\"7.3.0.7\",\"matchCriteriaId\":\"C84D7A48-6745-49D3-AE52-31DD7EEC0D61\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49318A1D-49F6-4CA7-AE31-0EB4B3790CBB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0.0\",\"versionEndExcluding\":\"7.1.0.11\",\"matchCriteriaId\":\"4A1A3A3E-5636-4422-9B7B-B3D97989E674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0.0\",\"versionEndExcluding\":\"7.2.0.9\",\"matchCriteriaId\":\"7384B993-049F-48D7-86D6-FE221C783245\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.3.0.0\",\"versionEndExcluding\":\"7.3.0.7\",\"matchCriteriaId\":\"B1DF6129-9CEA-4812-800F-A6FD5095D60E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7352FACE-C8D0-49A7-A2D7-B755599F0FB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0.0\",\"versionEndExcluding\":\"7.1.0.11\",\"matchCriteriaId\":\"79788A89-4152-4B4B-BFF0-518D90EE4D2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0.0\",\"versionEndExcluding\":\"7.2.0.9\",\"matchCriteriaId\":\"680738C5-63D5-4F60-9610-FD0D87FCBBCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.3.0.0\",\"versionEndExcluding\":\"7.3.0.7\",\"matchCriteriaId\":\"872E2102-6BE6-42B6-93B0-942B7DABCBDA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DACA26CF-7C3F-4215-B032-ED9C5EFD57D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.1.0.0\",\"versionEndExcluding\":\"7.1.0.11\",\"matchCriteriaId\":\"E6E31991-DF33-4F00-8430-7B626E8174CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2.0.0\",\"versionEndExcluding\":\"7.2.0.9\",\"matchCriteriaId\":\"B2E25BB0-6F5A-4A7B-9147-D4E17014C747\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.3.0.0\",\"versionEndExcluding\":\"7.3.0.7\",\"matchCriteriaId\":\"B80C1675-4948-45DC-B593-EDB1354E42F3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5D84487-CEBA-48A0-9B15-A0300D992E3D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.8.0.0\",\"versionEndExcluding\":\"3.8.0.07\",\"matchCriteriaId\":\"1CE69F8D-5EEE-4BC7-939C-CE71BCD2E11D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9.1.0\",\"versionEndExcluding\":\"3.9.1.08\",\"matchCriteriaId\":\"BDEC166F-A967-4616-B9EF-503054EFD197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1.2.0\",\"versionEndExcluding\":\"4.1.2.06\",\"matchCriteriaId\":\"713E71BC-16F5-41E3-9816-74D5E8D8C9A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:stn6500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D2487E0-046C-476F-BFF4-EF77D9E856D8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.8.0.0\",\"versionEndExcluding\":\"3.8.0.07\",\"matchCriteriaId\":\"0287F3CD-2151-491D-8BC3-6D3921BE8FFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9.1.0\",\"versionEndExcluding\":\"3.9.1.08\",\"matchCriteriaId\":\"C4179899-87B4-42C3-8245-9A34EC04F6A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1.2.0\",\"versionEndExcluding\":\"4.1.2.06\",\"matchCriteriaId\":\"B8CED766-9742-4037-8005-F0BDDE9176DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:stn6800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41EEAEC-08AE-4478-8977-5A4D7B48C175\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.8.0.0\",\"versionEndExcluding\":\"3.8.0.07\",\"matchCriteriaId\":\"298C961D-5E5F-4277-B192-A4C29243BECC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.9.1.0\",\"versionEndExcluding\":\"3.9.1.08\",\"matchCriteriaId\":\"E5A76C40-BA90-4FBD-8DFF-4AF8F952963A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.1.2.0\",\"versionEndExcluding\":\"4.1.2.06\",\"matchCriteriaId\":\"B0663FBC-01C0-4AD8-A0B8-6097E537D352\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:ibm:stn7800:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE145DE3-3C9B-4949-B6D4-9B259372CCE0\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"01EDA41C-6B2E-49AF-B503-EB3882265C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*\",\"matchCriteriaId\":\"CB66DB75-2B16-4EBF-9B93-CE49D8086E41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*\",\"matchCriteriaId\":\"815D70A8-47D3-459C-A32C-9FEACA0659D1\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0ABC25E5-76CD-469B-879A-B1F7109D0181\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98942F6C-330F-459A-B2B4-72572DB4070E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5A92B0C-7256-45F0-8E0C-ADFEF36CF43D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C0BAB94-6521-4B57-9E56-A57BA5E20C24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A7788E5-93B9-4149-8823-2ACBA5CF17E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*\",\"matchCriteriaId\":\"B41B4ECD-6F30-46F5-A559-1CEFC7964873\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*\",\"matchCriteriaId\":\"D42ADCD9-1455-401C-B94F-D367A78A2B97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:checkpoint:security_gateway:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"r77.30\",\"matchCriteriaId\":\"2853A787-E5F1-4455-9482-7C538B80556C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.1.0\",\"versionEndIncluding\":\"10.2.4\",\"matchCriteriaId\":\"79618AB4-7A8E-4488-8608-57EC2F8681FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.5.1\",\"matchCriteriaId\":\"8E910D60-1145-4229-9890-80D2D67C3845\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA77C6B-72DB-4D57-87CF-11F2C7EDB828\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.3.0\",\"versionEndIncluding\":\"11.5.1\",\"matchCriteriaId\":\"48BBEF73-E87D-467F-85EB-47BE212DF0E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B276E4DF-69FC-4158-B93A-781A45605034\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.5.1\",\"matchCriteriaId\":\"EE23220D-E364-41B7-A440-43B3AA4A716A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B70D2BD5-8E3F-4B57-84EF-3AF40F6378F1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.4.0\",\"versionEndIncluding\":\"11.5.1\",\"matchCriteriaId\":\"C483253F-841E-4D4E-9B4A-932E9D07268B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5B40837-EC2B-41FB-ACC3-806054EAF28C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.2.4\",\"matchCriteriaId\":\"667D3780-3949-41AC-83DE-5BCB8B36C382\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.5.1\",\"matchCriteriaId\":\"4F0E7766-BDB4-42AB-B6CC-6B4E86A10038\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"475F0EF8-42CB-4099-9C4A-390F946C4924\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.1.0\",\"versionEndIncluding\":\"10.2.4\",\"matchCriteriaId\":\"A8347412-DC42-4B86-BF6E-A44A5E1541ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.3.0\",\"matchCriteriaId\":\"C8942D9D-8E3A-4876-8E93-ED8D201FF546\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.2.4\",\"matchCriteriaId\":\"7B5AF8C8-578E-4FD7-8BAA-53A57EE4C653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.5.1\",\"matchCriteriaId\":\"06BA93C0-A7AE-4A8E-BD74-08149A204463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7D7863D-B064-4D7A-A66B-C3D3523425FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.2.4\",\"matchCriteriaId\":\"1DF6BB8A-FA63-4DBC-891C-256FF23CBCF0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.5.1\",\"matchCriteriaId\":\"3E0D8F52-0EAD-4E02-A8D8-CBAE2CDC703B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CDEC701-DAB3-4D92-AA67-B886E6693E46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.2.4\",\"matchCriteriaId\":\"289CEABB-22A2-436D-AE4B-4BDA2D0EAFDB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.5.1\",\"matchCriteriaId\":\"C6D61BF2-69D8-4AD2-85CD-D87F640A6888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FF5A5F6-4BA3-4276-8679-B5560EACF2E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.3.0\",\"versionEndIncluding\":\"11.5.1\",\"matchCriteriaId\":\"E9A06D61-E6CB-4A8A-B06D-9FEA1812C167\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB8D3B87-B8F5-490A-B1D9-04F2EE93EEA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.2.4\",\"matchCriteriaId\":\"2C0B4C01-C71E-4E35-B63A-68395984E033\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.4.1\",\"matchCriteriaId\":\"9828CBA5-BB72-46E2-987D-633A5B3E2AFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.2.4\",\"matchCriteriaId\":\"BB60C39D-52ED-47DD-9FB9-2B4BC8D9F8AC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.3.0\",\"matchCriteriaId\":\"68BC025A-D45E-45FB-A4E4-1C89320B5BBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndIncluding\":\"10.2.4\",\"matchCriteriaId\":\"AE007A64-5867-4B1A-AEFB-3AB2CD6A5EA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"11.0.0\",\"versionEndIncluding\":\"11.3.0\",\"matchCriteriaId\":\"7C75978B-566B-4353-8716-099CB8790EE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndIncluding\":\"4.4.0\",\"matchCriteriaId\":\"BC24B891-6DBA-4C02-B4CF-8D1CA53B4B74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.2.0\",\"versionEndIncluding\":\"4.4.0\",\"matchCriteriaId\":\"0BB0FDAC-C49D-4E63-ACA9-7BAD7C93A5D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndIncluding\":\"4.4.0\",\"matchCriteriaId\":\"3AEB1FC5-1179-4DE9-99A2-D650167A7A60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.1.0\",\"versionEndIncluding\":\"2.3.0\",\"matchCriteriaId\":\"0ADD1B04-9F78-40B3-8314-6935277073B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"3.0.0\",\"versionEndIncluding\":\"3.1.1\",\"matchCriteriaId\":\"482E630B-93A1-4B9B-8273-821C116ADC4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0.0\",\"versionEndIncluding\":\"4.0.5\",\"matchCriteriaId\":\"1343FBDC-4BF0-403B-B257-96672F092263\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C138527-73D3-4AEE-BFAB-1D240A585A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F2EB3D6-EF4C-4241-A31E-3990664004A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F0CD8F8-26CE-43F0-87EB-A08F1D1EDB25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D1168D2-93D5-4415-A666-B4BE0B2AC201\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.0.0\",\"versionEndIncluding\":\"6.4.0\",\"matchCriteriaId\":\"48A2FBA9-207F-4F16-932D-BF0BA3440503\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C6AC80F-9D91-468D-BEE3-6A0759723673\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"9.3.67.5r1\",\"matchCriteriaId\":\"FF1DB4B7-AFCC-4D56-95BA-C66AB7A36680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10\",\"versionEndExcluding\":\"10.1.129.11r1\",\"matchCriteriaId\":\"665EF643-3CDC-4518-9693-0D49F0870283\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.5\",\"versionEndExcluding\":\"10.5.52.11r1\",\"matchCriteriaId\":\"BAE3CC45-49E5-40DE-B5C3-52A754A9C599\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:citrix:netscaler_sdx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8968E39A-1E16-4B7F-A16A-190EBC20D04F\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.0.0\",\"versionEndExcluding\":\"10.10.0\",\"matchCriteriaId\":\"864B5480-704F-4636-A938-7D95AD4223AD\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35D34345-0AD1-499C-9A74-982B2D3F305A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DF3F07E-6F4E-4B97-B313-7DA3E8A88451\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C98B0EA-7A52-4BDF-90C2-38797FC2B75A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FECF06B5-3915-48F0-A140-41C7A27EE99D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"BBD8B161-0A07-492F-89E4-7A0BD02F6464\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3E8E0E1-FF63-425D-8C22-86B16CFB7B1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"29DF8DD7-B5CC-4152-A726-1D48459068D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server_appliance:5.5:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB2E2AAD-E221-4227-A41B-DC01BFDFCD6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC337BB7-9A45-4406-A783-851F279130EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C\"}]}]}],\"references\":[{\"url\":\"http://advisories.mageia.org/MGASA-2014-0388.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"security@debian.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1293.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1294.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1293.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1294.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1295.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1354.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Oct/0\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59272\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59737\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60325\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60947\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61188\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61471\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61542\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61547\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61676\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61700\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61711\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61715\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61780\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61855\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61857\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61873\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62228\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT6495\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-6271.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-3032\",\"source\":\"security@debian.org\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/252743\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015701\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/533593/100/0/threaded\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/70103\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2362-1\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/ncas/alerts/TA14-268A\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/articles/1200223\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/node/1200223\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1141597\",\"source\":\"security@debian.org\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA82\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT6535\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"security@debian.org\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\",\"source\":\"security@debian.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/34879/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/37816/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/38849/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/39918/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40619/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40938/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/42938/\",\"source\":\"security@debian.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"security@debian.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://advisories.mageia.org/MGASA-2014-0388.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://jvn.jp/en/jp/JVN55667175/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1293.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1294.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1293.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1294.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1295.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1354.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/fulldisclosure/2014/Oct/0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/58200\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59737\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/59907\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60024\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60034\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60044\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60055\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60063\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60325\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60433\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/60947\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61065\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61128\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61129\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61188\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61283\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61287\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61291\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61313\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61328\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61442\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61471\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61485\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61503\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61542\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61547\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61550\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61552\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61565\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61633\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61641\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61643\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61654\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61676\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61700\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61703\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61711\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61715\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61780\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61816\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61855\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61857\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/61873\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62228\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62312\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/62343\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://support.apple.com/kb/HT6495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://support.novell.com/security/cve/CVE-2014-6271.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-3032\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://www.kb.cert.org/vuls/id/252743\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015701\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.novell.com/support/kb/doc.php?id=7015721\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.qnap.com/i/en/support/con_show.php?cid=61\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/533593/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/70103\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.ubuntu.com/usn/USN-2362-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.us-cert.gov/ncas/alerts/TA14-268A\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/articles/1200223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/node/1200223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1141597\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kb.bluecoat.com/index?page=content\u0026id=SA82\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://support.apple.com/kb/HT6535\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX200217\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.citrix.com/article/CTX200223\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Permissions Required\"]},{\"url\":\"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\"]},{\"url\":\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.exploit-db.com/exploits/34879/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/37816/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/38849/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/39918/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40619/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/40938/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.exploit-db.com/exploits/42938/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.suse.com/support/shellshock/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6271\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.exploit-db.com/exploits/37816/\", \"name\": \"37816\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html\", \"name\": \"SUSE-SU-2014:1223\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2\", \"name\": \"HPSBMU03165\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2\", \"name\": \"SSRT101816\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/39918/\", \"name\": \"39918\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2\", \"name\": \"HPSBHF03119\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1295.html\", \"name\": \"RHSA-2014:1295\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html\", \"name\": \"openSUSE-SU-2014:1226\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2\", \"name\": \"HPSBST03131\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\", \"name\": \"SSRT101819\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/533593/100/0/threaded\", \"name\": \"20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\", \"name\": \"HPSBMU03245\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2\", \"name\": \"HPSBST03196\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61188\", \"name\": \"61188\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://jvn.jp/en/jp/JVN55667175/index.html\", \"name\": \"JVN#55667175\", \"tags\": [\"third-party-advisory\", \"x_refsource_JVN\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61676\", \"name\": \"61676\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40619/\", \"name\": \"40619\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\", \"name\": \"openSUSE-SU-2014:1254\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/60433\", \"name\": \"60433\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/38849/\", \"name\": \"38849\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2\", \"name\": \"HPSBMU03143\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2\", \"name\": \"HPSBMU03182\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html\", \"name\": \"SUSE-SU-2014:1260\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2\", \"name\": \"HPSBST03155\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61715\", \"name\": \"61715\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61816\", \"name\": \"61816\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\", \"name\": \"openSUSE-SU-2014:1310\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61442\", \"name\": \"61442\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2\", \"name\": \"HPSBMU03246\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2\", \"name\": \"HPSBST03195\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61283\", \"name\": \"61283\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\", \"name\": \"SSRT101711\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-2362-1\", \"name\": \"USN-2362-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\", \"x_transferred\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\", \"name\": \"openSUSE-SU-2014:1308\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61654\", \"name\": \"61654\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61542\", \"name\": \"61542\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www.novell.com/support/kb/doc.php?id=7015701\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/62312\", \"name\": \"62312\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/59272\", \"name\": \"59272\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2\", \"name\": \"HPSBST03122\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\", \"name\": \"HPSBMU03217\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\", \"name\": \"SSRT101868\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61703\", \"name\": \"61703\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://support.apple.com/kb/HT6495\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/252743\", \"name\": \"VU#252743\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61065\", \"name\": \"61065\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html\", \"name\": \"SUSE-SU-2014:1213\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2\", \"name\": \"HPSBST03129\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2\", \"name\": \"HPSBMU03144\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/70103\", \"name\": \"70103\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\", \"name\": \"JVNDB-2014-000126\", \"tags\": [\"third-party-advisory\", \"x_refsource_JVNDB\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\", \"name\": \"SSRT101827\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www.us-cert.gov/ncas/alerts/TA14-268A\", \"name\": \"TA14-268A\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html\", \"name\": \"SUSE-SU-2014:1212\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61641\", \"name\": \"61641\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/node/1200223\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html\", \"name\": \"SUSE-SU-2014:1287\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html\", \"name\": \"APPLE-SA-2014-10-16-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_APPLE\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2014/Oct/0\", \"name\": \"20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\", \"x_transferred\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\", \"name\": \"MDVSA-2015:164\", \"tags\": [\"vendor-advisory\", \"x_refsource_MANDRIVA\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1293.html\", \"name\": \"RHSA-2014:1293\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html\", \"name\": \"openSUSE-SU-2014:1238\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\", \"name\": \"HPSBMU03220\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/60325\", \"name\": \"60325\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/60024\", \"name\": \"60024\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/34879/\", \"name\": \"34879\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"https://access.redhat.com/articles/1200223\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/62343\", \"name\": \"62343\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61565\", \"name\": \"61565\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"https://www.suse.com/support/shellshock/\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2\", \"name\": \"HPSBST03157\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61313\", \"name\": \"61313\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\", \"name\": \"SSRT101742\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61873\", \"name\": \"61873\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61485\", \"name\": \"61485\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/60947\", \"name\": \"60947\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://support.apple.com/kb/HT6535\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2\", \"name\": \"HPSBST03154\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2\", \"name\": \"HPSBST03265\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2\", \"name\": \"HPSBGN03142\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61312\", \"name\": \"61312\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/60193\", \"name\": \"60193\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://linux.oracle.com/errata/ELSA-2014-1294.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/60063\", \"name\": \"60063\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/60034\", \"name\": \"60034\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2\", \"name\": \"HPSBMU03133\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/59907\", \"name\": \"59907\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/58200\", \"name\": \"58200\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2\", \"name\": \"HPSBST03181\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61643\", \"name\": \"61643\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www.novell.com/support/kb/doc.php?id=7015721\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61503\", \"name\": \"61503\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1354.html\", \"name\": \"RHSA-2014:1354\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40938/\", \"name\": \"40938\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2\", \"name\": \"HPSBGN03117\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://support.novell.com/security/cve/CVE-2014-6271.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61547\", \"name\": \"61547\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2\", \"name\": \"HPSBHF03145\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www.qnap.com/i/en/support/con_show.php?cid=61\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2\", \"name\": \"HPSBST03148\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61552\", \"name\": \"61552\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61780\", \"name\": \"61780\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://support.citrix.com/article/CTX200223\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-3032\", \"name\": \"DSA-3032\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/62228\", \"name\": \"62228\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2\", \"name\": \"HPSBGN03138\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61855\", \"name\": \"61855\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2\", \"name\": \"HPSBHF03124\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/60044\", \"name\": \"60044\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61291\", \"name\": \"61291\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1294.html\", \"name\": \"RHSA-2014:1294\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2\", \"name\": \"HPSBHF03125\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/59737\", \"name\": \"59737\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61287\", \"name\": \"61287\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2\", \"name\": \"HPSBHF03146\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\", \"name\": \"HPSBGN03233\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1141597\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\", \"name\": \"SSRT101739\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61711\", \"name\": \"61711\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\", \"name\": \"HPSBOV03228\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2\", \"name\": \"HPSBGN03141\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\", \"x_transferred\"]}, {\"url\": \"http://advisories.mageia.org/MGASA-2014-0388.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61128\", \"name\": \"61128\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"https://support.citrix.com/article/CTX200217\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61471\", \"name\": \"61471\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/60055\", \"name\": \"60055\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\", \"name\": \"20140926 GNU Bash Environmental Variable Command Injection Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61550\", \"name\": \"61550\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61633\", \"name\": \"61633\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://linux.oracle.com/errata/ELSA-2014-1293.html\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://kb.bluecoat.com/index?page=content\u0026id=SA82\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61328\", \"name\": \"61328\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/42938/\", \"name\": \"42938\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61129\", \"name\": \"61129\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61700\", \"name\": \"61700\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61603\", \"name\": \"61603\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://secunia.com/advisories/61857\", \"name\": \"61857\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\", \"x_transferred\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-06T12:10:13.276Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2014-6271\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-07T13:45:49.549420Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2022-01-28\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6271\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2022-01-28T00:00:00+00:00\", \"value\": \"CVE-2014-6271 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6271\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-78\", \"description\": \"CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-07T13:45:37.256Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"datePublic\": \"2014-09-24T00:00:00.000Z\", \"references\": [{\"url\": \"https://www.exploit-db.com/exploits/37816/\", \"name\": \"37816\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html\", \"name\": \"SUSE-SU-2014:1223\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2\", \"name\": \"HPSBMU03165\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2\", \"name\": \"SSRT101816\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"https://www.exploit-db.com/exploits/39918/\", \"name\": \"39918\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2\", \"name\": \"HPSBHF03119\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1295.html\", \"name\": \"RHSA-2014:1295\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html\", \"name\": \"openSUSE-SU-2014:1226\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2\", \"name\": \"HPSBST03131\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\", \"name\": \"SSRT101819\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/533593/100/0/threaded\", \"name\": \"20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities\", \"tags\": [\"mailing-list\", \"x_refsource_BUGTRAQ\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\", \"name\": \"HPSBMU03245\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2\", \"name\": \"HPSBST03196\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61188\", \"name\": \"61188\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://jvn.jp/en/jp/JVN55667175/index.html\", \"name\": \"JVN#55667175\", \"tags\": [\"third-party-advisory\", \"x_refsource_JVN\"]}, {\"url\": \"http://secunia.com/advisories/61676\", \"name\": \"61676\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40619/\", \"name\": \"40619\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\", \"name\": \"openSUSE-SU-2014:1254\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://secunia.com/advisories/60433\", \"name\": \"60433\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"https://www.exploit-db.com/exploits/38849/\", \"name\": \"38849\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2\", \"name\": \"HPSBMU03143\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2\", \"name\": \"HPSBMU03182\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html\", \"name\": \"SUSE-SU-2014:1260\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2\", \"name\": \"HPSBST03155\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/61715\", \"name\": \"61715\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/61816\", \"name\": \"61816\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\", \"name\": \"openSUSE-SU-2014:1310\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://secunia.com/advisories/61442\", \"name\": \"61442\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2\", \"name\": \"HPSBMU03246\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2\", \"name\": \"HPSBST03195\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61283\", \"name\": \"61283\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\", \"name\": \"SSRT101711\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www.ubuntu.com/usn/USN-2362-1\", \"name\": \"USN-2362-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_UBUNTU\"]}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\", \"name\": \"openSUSE-SU-2014:1308\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://secunia.com/advisories/61654\", \"name\": \"61654\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61542\", \"name\": \"61542\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www.novell.com/support/kb/doc.php?id=7015701\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/62312\", \"name\": \"62312\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/59272\", \"name\": \"59272\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2\", \"name\": \"HPSBST03122\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\", \"name\": \"HPSBMU03217\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\", \"name\": \"SSRT101868\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61703\", \"name\": \"61703\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://support.apple.com/kb/HT6495\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.kb.cert.org/vuls/id/252743\", \"name\": \"VU#252743\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT-VN\"]}, {\"url\": \"http://secunia.com/advisories/61065\", \"name\": \"61065\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html\", \"name\": \"SUSE-SU-2014:1213\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2\", \"name\": \"HPSBST03129\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2\", \"name\": \"HPSBMU03144\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/70103\", \"name\": \"70103\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\", \"name\": \"JVNDB-2014-000126\", \"tags\": [\"third-party-advisory\", \"x_refsource_JVNDB\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\", \"name\": \"SSRT101827\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www.us-cert.gov/ncas/alerts/TA14-268A\", \"name\": \"TA14-268A\", \"tags\": [\"third-party-advisory\", \"x_refsource_CERT\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html\", \"name\": \"SUSE-SU-2014:1212\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://secunia.com/advisories/61641\", \"name\": \"61641\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://access.redhat.com/node/1200223\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html\", \"name\": \"SUSE-SU-2014:1287\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html\", \"name\": \"APPLE-SA-2014-10-16-1\", \"tags\": [\"vendor-advisory\", \"x_refsource_APPLE\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://seclists.org/fulldisclosure/2014/Oct/0\", \"name\": \"20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities\", \"tags\": [\"mailing-list\", \"x_refsource_FULLDISC\"]}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\", \"name\": \"MDVSA-2015:164\", \"tags\": [\"vendor-advisory\", \"x_refsource_MANDRIVA\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1293.html\", \"name\": \"RHSA-2014:1293\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html\", \"name\": \"openSUSE-SU-2014:1238\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\", \"name\": \"HPSBMU03220\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/60325\", \"name\": \"60325\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/60024\", \"name\": \"60024\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.exploit-db.com/exploits/34879/\", \"name\": \"34879\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"https://access.redhat.com/articles/1200223\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/62343\", \"name\": \"62343\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61565\", \"name\": \"61565\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"https://www.suse.com/support/shellshock/\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2\", \"name\": \"HPSBST03157\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61313\", \"name\": \"61313\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\", \"name\": \"SSRT101742\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61873\", \"name\": \"61873\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61485\", \"name\": \"61485\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/60947\", \"name\": \"60947\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://support.apple.com/kb/HT6535\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2\", \"name\": \"HPSBST03154\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2\", \"name\": \"HPSBST03265\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2\", \"name\": \"HPSBGN03142\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61312\", \"name\": \"61312\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/60193\", \"name\": \"60193\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://linux.oracle.com/errata/ELSA-2014-1294.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/60063\", \"name\": \"60063\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://secunia.com/advisories/60034\", \"name\": \"60034\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2\", \"name\": \"HPSBMU03133\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"http://secunia.com/advisories/59907\", \"name\": \"59907\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/58200\", \"name\": \"58200\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2\", \"name\": \"HPSBST03181\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61643\", \"name\": \"61643\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www.novell.com/support/kb/doc.php?id=7015721\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/61503\", \"name\": \"61503\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1354.html\", \"name\": \"RHSA-2014:1354\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://www.exploit-db.com/exploits/40938/\", \"name\": \"40938\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2\", \"name\": \"HPSBGN03117\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://support.novell.com/security/cve/CVE-2014-6271.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/61547\", \"name\": \"61547\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2\", \"name\": \"HPSBHF03145\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www.qnap.com/i/en/support/con_show.php?cid=61\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2\", \"name\": \"HPSBST03148\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61552\", \"name\": \"61552\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61780\", \"name\": \"61780\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://support.citrix.com/article/CTX200223\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.debian.org/security/2014/dsa-3032\", \"name\": \"DSA-3032\", \"tags\": [\"vendor-advisory\", \"x_refsource_DEBIAN\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/62228\", \"name\": \"62228\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2\", \"name\": \"HPSBGN03138\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61855\", \"name\": \"61855\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2\", \"name\": \"HPSBHF03124\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/60044\", \"name\": \"60044\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61291\", \"name\": \"61291\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1294.html\", \"name\": \"RHSA-2014:1294\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2\", \"name\": \"HPSBHF03125\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/59737\", \"name\": \"59737\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61287\", \"name\": \"61287\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2\", \"name\": \"HPSBHF03146\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\", \"name\": \"HPSBGN03233\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1141597\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\", \"name\": \"SSRT101739\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://secunia.com/advisories/61711\", \"name\": \"61711\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\", \"name\": \"HPSBOV03228\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2\", \"name\": \"HPSBGN03141\", \"tags\": [\"vendor-advisory\", \"x_refsource_HP\"]}, {\"url\": \"http://advisories.mageia.org/MGASA-2014-0388.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/61128\", \"name\": \"61128\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"https://support.citrix.com/article/CTX200217\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/61471\", \"name\": \"61471\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/60055\", \"name\": \"60055\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\", \"name\": \"20140926 GNU Bash Environmental Variable Command Injection Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}, {\"url\": \"http://secunia.com/advisories/61550\", \"name\": \"61550\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61633\", \"name\": \"61633\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://linux.oracle.com/errata/ELSA-2014-1293.html\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://kb.bluecoat.com/index?page=content\u0026id=SA82\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://secunia.com/advisories/61328\", \"name\": \"61328\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://www.exploit-db.com/exploits/42938/\", \"name\": \"42938\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://secunia.com/advisories/61129\", \"name\": \"61129\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61700\", \"name\": \"61700\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61603\", \"name\": \"61603\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://secunia.com/advisories/61857\", \"name\": \"61857\", \"tags\": [\"third-party-advisory\", \"x_refsource_SECUNIA\"]}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \\\"ShellShock.\\\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"79363d38-fa19-49d1-9214-5f28da3f3ac5\", \"shortName\": \"debian\", \"dateUpdated\": \"2021-11-05T16:37:05.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.exploit-db.com/exploits/37816/\", \"name\": \"37816\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\", \"name\": \"http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html\", \"name\": \"SUSE-SU-2014:1223\", \"refsource\": \"SUSE\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685749\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2\", \"name\": \"HPSBMU03165\", \"refsource\": \"HP\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2\", \"name\": \"SSRT101816\", \"refsource\": \"HP\"}, {\"url\": \"https://www.exploit-db.com/exploits/39918/\", \"name\": \"39918\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2\", \"name\": \"HPSBHF03119\", \"refsource\": \"HP\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1295.html\", \"name\": \"RHSA-2014:1295\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html\", \"name\": \"openSUSE-SU-2014:1226\", \"refsource\": \"SUSE\"}, {\"url\": \"https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\", \"name\": \"https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\", \"name\": \"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2\", \"name\": \"HPSBST03131\", \"refsource\": \"HP\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\", \"name\": \"SSRT101819\", \"refsource\": \"HP\"}, {\"url\": \"http://www.securityfocus.com/archive/1/533593/100/0/threaded\", \"name\": \"20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities\", \"refsource\": \"BUGTRAQ\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\", \"name\": \"HPSBMU03245\", \"refsource\": \"HP\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686084\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686479\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2\", \"name\": \"HPSBST03196\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61188\", \"name\": \"61188\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0\", \"name\": \"http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://jvn.jp/en/jp/JVN55667175/index.html\", \"name\": \"JVN#55667175\", \"refsource\": \"JVN\"}, {\"url\": \"http://secunia.com/advisories/61676\", \"name\": \"61676\", \"refsource\": \"SECUNIA\"}, {\"url\": \"https://www.exploit-db.com/exploits/40619/\", \"name\": \"40619\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html\", \"name\": \"openSUSE-SU-2014:1254\", \"refsource\": \"SUSE\"}, {\"url\": \"http://secunia.com/advisories/60433\", \"name\": \"60433\", \"refsource\": \"SECUNIA\"}, {\"url\": \"https://www.exploit-db.com/exploits/38849/\", \"name\": \"38849\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2\", \"name\": \"HPSBMU03143\", \"refsource\": \"HP\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2\", \"name\": \"HPSBMU03182\", \"refsource\": \"HP\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673\", \"name\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html\", \"name\": \"SUSE-SU-2014:1260\", \"refsource\": \"SUSE\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2\", \"name\": \"HPSBST03155\", \"refsource\": \"HP\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685541\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/61715\", \"name\": \"61715\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\", \"name\": \"http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/61816\", \"name\": \"61816\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html\", \"name\": \"openSUSE-SU-2014:1310\", \"refsource\": \"SUSE\"}, {\"url\": \"http://secunia.com/advisories/61442\", \"name\": \"61442\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2\", \"name\": \"HPSBMU03246\", \"refsource\": \"HP\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2\", \"name\": \"HPSBST03195\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61283\", \"name\": \"61283\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\", \"name\": \"SSRT101711\", \"refsource\": \"HP\"}, {\"url\": \"http://www.ubuntu.com/usn/USN-2362-1\", \"name\": \"USN-2362-1\", \"refsource\": \"UBUNTU\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\", \"name\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html\", \"name\": \"openSUSE-SU-2014:1308\", \"refsource\": \"SUSE\"}, {\"url\": \"http://secunia.com/advisories/61654\", \"name\": \"61654\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61542\", \"name\": \"61542\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www.novell.com/support/kb/doc.php?id=7015701\", \"name\": \"http://www.novell.com/support/kb/doc.php?id=7015701\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\", \"name\": \"http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/62312\", \"name\": \"62312\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/59272\", \"name\": \"59272\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2\", \"name\": \"HPSBST03122\", \"refsource\": \"HP\"}, {\"url\": \"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\", \"name\": \"https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\", \"name\": \"HPSBMU03217\", \"refsource\": \"HP\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685604\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\", \"name\": \"SSRT101868\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61703\", \"name\": \"61703\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://support.apple.com/kb/HT6495\", \"name\": \"http://support.apple.com/kb/HT6495\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/252743\", \"name\": \"VU#252743\", \"refsource\": \"CERT-VN\"}, {\"url\": \"http://secunia.com/advisories/61065\", \"name\": \"61065\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html\", \"name\": \"SUSE-SU-2014:1213\", \"refsource\": \"SUSE\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2\", \"name\": \"HPSBST03129\", \"refsource\": \"HP\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2\", \"name\": \"HPSBMU03144\", \"refsource\": \"HP\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686445\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686131\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/70103\", \"name\": \"70103\", \"refsource\": \"BID\"}, {\"url\": \"http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126\", \"name\": \"JVNDB-2014-000126\", \"refsource\": \"JVNDB\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2\", \"name\": \"SSRT101827\", \"refsource\": \"HP\"}, {\"url\": \"http://www.us-cert.gov/ncas/alerts/TA14-268A\", \"name\": \"TA14-268A\", \"refsource\": \"CERT\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html\", \"name\": \"SUSE-SU-2014:1212\", \"refsource\": \"SUSE\"}, {\"url\": \"http://secunia.com/advisories/61641\", \"name\": \"61641\", \"refsource\": \"SECUNIA\"}, {\"url\": \"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\", \"name\": \"https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://access.redhat.com/node/1200223\", \"name\": \"https://access.redhat.com/node/1200223\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html\", \"name\": \"http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html\", \"name\": \"SUSE-SU-2014:1287\", \"refsource\": \"SUSE\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html\", \"name\": \"APPLE-SA-2014-10-16-1\", \"refsource\": \"APPLE\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685914\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://seclists.org/fulldisclosure/2014/Oct/0\", \"name\": \"20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities\", \"refsource\": \"FULLDISC\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2015:164\", \"name\": \"MDVSA-2015:164\", \"refsource\": \"MANDRIVA\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1293.html\", \"name\": \"RHSA-2014:1293\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\", \"name\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html\", \"name\": \"openSUSE-SU-2014:1238\", \"refsource\": \"SUSE\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2\", \"name\": \"HPSBMU03220\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/60325\", \"name\": \"60325\", \"refsource\": \"SECUNIA\"}, {\"url\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"name\": \"https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/60024\", \"name\": \"60024\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\", \"name\": \"http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://www.exploit-db.com/exploits/34879/\", \"name\": \"34879\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"https://access.redhat.com/articles/1200223\", \"name\": \"https://access.redhat.com/articles/1200223\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/62343\", \"name\": \"62343\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61565\", \"name\": \"61565\", \"refsource\": \"SECUNIA\"}, {\"url\": \"https://www.suse.com/support/shellshock/\", \"name\": \"https://www.suse.com/support/shellshock/\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2\", \"name\": \"HPSBST03157\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61313\", \"name\": \"61313\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2\", \"name\": \"SSRT101742\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61873\", \"name\": \"61873\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61485\", \"name\": \"61485\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/60947\", \"name\": \"60947\", \"refsource\": \"SECUNIA\"}, {\"url\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\", \"name\": \"https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://support.apple.com/kb/HT6535\", \"name\": \"https://support.apple.com/kb/HT6535\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2\", \"name\": \"HPSBST03154\", \"refsource\": \"HP\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2\", \"name\": \"HPSBST03265\", \"refsource\": \"HP\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2\", \"name\": \"HPSBGN03142\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61312\", \"name\": \"61312\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/60193\", \"name\": \"60193\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\", \"name\": \"http://www.vmware.com/security/advisories/VMSA-2014-0010.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://linux.oracle.com/errata/ELSA-2014-1294.html\", \"name\": \"http://linux.oracle.com/errata/ELSA-2014-1294.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/60063\", \"name\": \"60063\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html\", \"name\": \"http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://secunia.com/advisories/60034\", \"name\": \"60034\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2\", \"name\": \"HPSBMU03133\", \"refsource\": \"HP\"}, {\"url\": \"http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\", \"name\": \"http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html\", \"refsource\": \"MISC\"}, {\"url\": \"http://secunia.com/advisories/59907\", \"name\": \"59907\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/58200\", \"name\": \"58200\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2\", \"name\": \"HPSBST03181\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61643\", \"name\": \"61643\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www.novell.com/support/kb/doc.php?id=7015721\", \"name\": \"http://www.novell.com/support/kb/doc.php?id=7015721\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21687079\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/61503\", \"name\": \"61503\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686246\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1354.html\", \"name\": \"RHSA-2014:1354\", \"refsource\": \"REDHAT\"}, {\"url\": \"https://www.exploit-db.com/exploits/40938/\", \"name\": \"40938\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2\", \"name\": \"HPSBGN03117\", \"refsource\": \"HP\"}, {\"url\": \"http://support.novell.com/security/cve/CVE-2014-6271.html\", \"name\": \"http://support.novell.com/security/cve/CVE-2014-6271.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/61547\", \"name\": \"61547\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2\", \"name\": \"HPSBHF03145\", \"refsource\": \"HP\"}, {\"url\": \"http://www.qnap.com/i/en/support/con_show.php?cid=61\", \"name\": \"http://www.qnap.com/i/en/support/con_show.php?cid=61\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2\", \"name\": \"HPSBST03148\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61552\", \"name\": \"61552\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61780\", \"name\": \"61780\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://support.citrix.com/article/CTX200223\", \"name\": \"https://support.citrix.com/article/CTX200223\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.debian.org/security/2014/dsa-3032\", \"name\": \"DSA-3032\", \"refsource\": \"DEBIAN\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686447\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/62228\", \"name\": \"62228\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2\", \"name\": \"HPSBGN03138\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61855\", \"name\": \"61855\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2\", \"name\": \"HPSBHF03124\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/60044\", \"name\": \"60044\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61291\", \"name\": \"61291\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2014-1294.html\", \"name\": \"RHSA-2014:1294\", \"refsource\": \"REDHAT\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2\", \"name\": \"HPSBHF03125\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/59737\", \"name\": \"59737\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61287\", \"name\": \"61287\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2\", \"name\": \"HPSBHF03146\", \"refsource\": \"HP\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\", \"name\": \"HPSBGN03233\", \"refsource\": \"HP\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1141597\", \"name\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1141597\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2\", \"name\": \"SSRT101739\", \"refsource\": \"HP\"}, {\"url\": \"http://secunia.com/advisories/61711\", \"name\": \"61711\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2\", \"name\": \"HPSBOV03228\", \"refsource\": \"HP\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2\", \"name\": \"HPSBGN03141\", \"refsource\": \"HP\"}, {\"url\": \"http://advisories.mageia.org/MGASA-2014-0388.html\", \"name\": \"http://advisories.mageia.org/MGASA-2014-0388.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/61128\", \"name\": \"61128\", \"refsource\": \"SECUNIA\"}, {\"url\": \"https://support.citrix.com/article/CTX200217\", \"name\": \"https://support.citrix.com/article/CTX200217\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/61471\", \"name\": \"61471\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/60055\", \"name\": \"60055\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash\", \"name\": \"20140926 GNU Bash Environmental Variable Command Injection Vulnerability\", \"refsource\": \"CISCO\"}, {\"url\": \"http://secunia.com/advisories/61550\", \"name\": \"61550\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61633\", \"name\": \"61633\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://linux.oracle.com/errata/ELSA-2014-1293.html\", \"name\": \"http://linux.oracle.com/errata/ELSA-2014-1293.html\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21686494\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://kb.bluecoat.com/index?page=content\u0026id=SA82\", \"name\": \"https://kb.bluecoat.com/index?page=content\u0026id=SA82\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://secunia.com/advisories/61328\", \"name\": \"61328\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=swg21685733\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://www.exploit-db.com/exploits/42938/\", \"name\": \"42938\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://secunia.com/advisories/61129\", \"name\": \"61129\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61700\", \"name\": \"61700\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61603\", \"name\": \"61603\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://secunia.com/advisories/61857\", \"name\": \"61857\", \"refsource\": \"SECUNIA\"}, {\"url\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\", \"name\": \"http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html\", \"name\": \"http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006\", \"name\": \"https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \\\"ShellShock.\\\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2014-6271\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@debian.org\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2014-6271\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T19:56:10.658Z\", \"dateReserved\": \"2014-09-09T00:00:00.000Z\", \"assignerOrgId\": \"79363d38-fa19-49d1-9214-5f28da3f3ac5\", \"datePublished\": \"2014-09-24T18:00:00.000Z\", \"assignerShortName\": \"debian\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
ICSA-15-344-01B
Vulnerability from csaf_cisa - Published: 2015-09-12 06:00 - Updated: 2025-06-09 16:28Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-15-344-01B JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2015/icsa-15-344-01b.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-15-344-01B - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-15-344-01b"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Advantech EKI Vulnerabilities (Update B)",
"tracking": {
"current_release_date": "2025-06-09T16:28:52.618727Z",
"generator": {
"date": "2025-06-09T16:28:52.618625Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-15-344-01B",
"initial_release_date": "2015-09-12T06:00:00.000000Z",
"revision_history": [
{
"date": "2015-09-12T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-09T16:28:52.618727Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Advantech EKI-132x platform devices: vers:all/*",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "EKI-132x platform devices"
}
],
"category": "vendor",
"name": "Advantech"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-6271",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Update to the latest version. (http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*\u0026searchtabs=Firmware)",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*\u0026searchtabs=Firmware"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2014-0160",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Update to the latest version. (http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*\u0026searchtabs=Firmware)",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*\u0026searchtabs=Firmware"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2012-2152",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "summary",
"text": "Stack-based buffer overflow in the get_packet method in socket.c in dhcpcd 3.2.3 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long packet.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Update to the latest version. (http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*\u0026searchtabs=Firmware)",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*\u0026searchtabs=Firmware"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
},
{
"cve": "CVE-2015-7938",
"cwe": {
"id": "CWE-592",
"name": "DEPRECATED: Authentication Bypass Issues"
},
"notes": [
{
"category": "summary",
"text": "Advantech EKI-132x devices with firmware before 2015-12-31 allow remote attackers to bypass authentication via unspecified vectors.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001"
]
},
"remediations": [
{
"category": "mitigation",
"details": "Update to the latest version. (http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*\u0026searchtabs=Firmware)",
"product_ids": [
"CSAFPID-0001"
],
"url": "http://support.advantech.com.tw/Support/SearchResult.aspx?keyword=EKI-132*\u0026searchtabs=Firmware"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-0001"
]
}
]
}
]
}
ICSA-14-269-01A
Vulnerability from csaf_cisa - Published: 2014-06-29 06:00 - Updated: 2025-06-06 18:46Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "general",
"text": "This CSAF advisory was extracted from unstructured data and may contain inaccuracies. If you notice any errors, please reach out to the designated contact at CISA CSAF: central@cisa.dhs.gov",
"title": "CISA Disclaimer"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs). Recognize VPNs may have vulnerabilities, should be updated to the most recent version available, and are only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks: Do not click web links or open attachments in unsolicited email messages. Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams. Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-14-269-01A JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2014/icsa-14-269-01a.json"
},
{
"category": "self",
"summary": "ICS Advisory ICSA-14-269-01A - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
}
],
"title": "Bash Command Injection Vulnerability",
"tracking": {
"current_release_date": "2025-06-06T18:46:41.883464Z",
"generator": {
"date": "2025-06-06T18:46:41.883406Z",
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-14-269-01A",
"initial_release_date": "2014-06-29T06:00:00.000000Z",
"revision_history": [
{
"date": "2014-06-29T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
},
{
"date": "2025-06-06T18:46:41.883464Z",
"legacy_version": "CSAF Conversion",
"number": "2",
"summary": "Advisory converted into a CSAF"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens ABB Tropos 3000, 4000, 6000, \u0026 7000 series routers: vers:all/*",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "ABB Tropos 3000, 4000, 6000, \u0026 7000 series routers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens ABB Ventyx NM EMS/SCADA on RHEL Ventyx: vers:all/*",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "ABB Ventyx NM EMS/SCADA on RHEL Ventyx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "4.x|5.x|6.x",
"product": {
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens Meinberg LANTIME: 4.x|5.x|6.x",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Meinberg LANTIME"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens Moxa Linux-based computers: vers:all/*",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Moxa Linux-based computers"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens Red Lion Sixnet BT-5000 and 6000 Series: vers:all/*",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "Red Lion Sixnet BT-5000 and 6000 Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens Red Lion RAM 9000, RAM 6000, SN 6000 and M, A and R Series: vers:all/*",
"product_id": "CSAFPID-0006"
}
}
],
"category": "product_name",
"name": "Red Lion RAM 9000, RAM 6000, SN 6000 and M, A and R Series"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V1.16.0",
"product": {
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens Siemens ROX 1: \u003c=V1.16.0",
"product_id": "CSAFPID-0007"
}
}
],
"category": "product_name",
"name": "Siemens ROX 1"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c=V2.5.0",
"product": {
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens Siemens ROX 2: \u003c=V2.5.0",
"product_id": "CSAFPID-0008"
}
}
],
"category": "product_name",
"name": "Siemens ROX 2"
},
{
"branches": [
{
"category": "product_version",
"name": "V1.0",
"product": {
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens Siemens APE Linux with ELAN installed: V1.0",
"product_id": "CSAFPID-0009"
}
}
],
"category": "product_name",
"name": "Siemens APE Linux with ELAN installed"
}
],
"category": "vendor",
"name": "ABB ; Cisco ; Digi ; eWON ; Meinberg ; Moxa ; Red Lion; Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-6271",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
"remediations": [
{
"category": "mitigation",
"details": "There are several functional mitigations for this vulnerability including upgrading to a new version of bash, replacing bash with an alternate shell, limiting access to vulnerable services, and/or filtering inputs to vulnerable services.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "Patches have been released to fix this vulnerability by major Linux vendors for affected versions",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "however, solutions for CVE-2014-6271 do not completely resolve the vulnerability. It is advised to install existing patches and pay attention for updated patches to address CVE-2014-7169.Vulnerability Summary for CVE-2014-7169 (http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169"
},
{
"category": "mitigation",
"details": "(https://www.cve.org/CVERecord?id=CVE-2014-7169)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"category": "mitigation",
"details": "Many UNIX-like operating systems, including Linux distributions, BSD variants, and Apple Mac OS X include bash and are likely to be affected. Contact your respective Linux or Unix-based OS vendor(s) for updated information. A list of vendors can be found in CERT Vulnerability Note VU#252743.Vulnerability Note VU#252743, (http://www.kb.cert.org/vuls/id/252743)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"category": "mitigation",
"details": "ICS-CERT recommends system administrators review the vendor patches and the NIST Vulnerability Summary for CVE-2014-7169e, to mitigate damage caused by the exploit.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "Other helpful resources include: (https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
},
{
"category": "mitigation",
"details": "(http://lists.gnu.org/archive/html/bug-bash/2014-09/threads.html)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://lists.gnu.org/archive/html/bug-bash/2014-09/threads.html"
},
{
"category": "mitigation",
"details": "(https://www.us-cert.gov/ncas/current-activity/2014/09/24/Bourne-Again-Shell-Bash-Remote-Code-Execution-Vulnerability)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://www.us-cert.gov/ncas/current-activity/2014/09/24/Bourne-Again-Shell-Bash-Remote-Code-Execution-Vulnerability"
},
{
"category": "mitigation",
"details": "(https://www.us-cert.gov/ncas/alerts/TA14-268A)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://www.us-cert.gov/ncas/alerts/TA14-268A"
},
{
"category": "mitigation",
"details": "(https://www.cert.gov.uk/resources/alerts/update-bash-vulnerability-aka-shellshock/)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://www.cert.gov.uk/resources/alerts/update-bash-vulnerability-aka-shellshock/"
},
{
"category": "mitigation",
"details": "Support Information: Novel/SuSE (http://support.novell.com/security/cve/CVE-2014-6271.html)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://support.novell.com/security/cve/CVE-2014-6271.html"
},
{
"category": "mitigation",
"details": "Debian (https://www.debian.org/security/2014/dsa-3032)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://www.debian.org/security/2014/dsa-3032"
},
{
"category": "mitigation",
"details": "Ubuntu (http://www.ubuntu.com/usn/usn-2362-1/)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://www.ubuntu.com/usn/usn-2362-1/"
},
{
"category": "mitigation",
"details": "Mint",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "Redhat/Fedora (https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6271)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2014-6271"
},
{
"category": "mitigation",
"details": "Mageia (https://forums.mageia.org/en/viewtopic.php?f=5\u0026t=8487)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "https://forums.mageia.org/en/viewtopic.php?f=5\u0026t=8487"
},
{
"category": "mitigation",
"details": "CentOS (http://centosnow.blogspot.com/2014/09/critical-bash-updates-for-centos-5.html)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://centosnow.blogspot.com/2014/09/critical-bash-updates-for-centos-5.html"
},
{
"category": "mitigation",
"details": "As bash may be used as a third-party component, asset owners, operators, and ICS software developers are encouraged to investigate the use of the affected versions of bash in their environments.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "The ST and PT ISAC released the following test string to determine detect vulnerable installations.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "To check if you are patched, you can use the original test string: env x=\u0027() { :",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "}",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "echo vulnerable\u0027 bash -c \"echo this is a test\"",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "If you are patched, but want to demonstrate that you are still vulnerable, you can use this command: env X=\u0027() { (a)=\u003e\\\u0027 bash -c \"echo date\"",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "This command will return an error on a patched system, but it will still create a file with the output of `date` in a file called \"echo\".",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "Please see ABB\u2019s public notification and mitigation strategies at: (http://www.abb.com/cawp/abbzh254/2c9d1261d9fa1dcfc1257950002e4fbf.aspx)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://www.abb.com/cawp/abbzh254/2c9d1261d9fa1dcfc1257950002e4fbf.aspx"
},
{
"category": "mitigation",
"details": "Please see Cisco\u2019s advisory for full list of affected products at: (http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash"
},
{
"category": "mitigation",
"details": "Digi says that the vulnerability cannot be exploited remotely on Connectport LTS, Digi Passport, Digi CM.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "Please see eWON\u2019s advisory for full list of affected products at: (http://www.talk2m.com/en/shellshock-vulnerability-ewon-and-talk2m-on-the-safe-side.html?cmp_id=7\u0026news_id=54\u0026vID=17)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://www.talk2m.com/en/shellshock-vulnerability-ewon-and-talk2m-on-the-safe-side.html?cmp_id=7\u0026news_id=54\u0026vID=17"
},
{
"category": "mitigation",
"details": "Please see Meinberg\u2019s public notification and mitigation strategies at: (http://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-1403-gnu-bash-environmental-variable-command-injection-vulnerability.htm)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://www.meinbergglobal.com/english/news/meinberg-security-advisory-mbgsa-1403-gnu-bash-environmental-variable-command-injection-vulnerability.htm"
},
{
"category": "mitigation",
"details": "Moxa is currently investigating a solution.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "Red Lion Sixnet BT-5000 and 6000 Series, RAM 9000, RAM 6000, SN 6000 and M, A and R Series use the bash shell but are not considered to be vulnerable or exploitable.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
},
{
"category": "mitigation",
"details": "Please refer to SSA-86096 for more details at Siemens\u2019 web site: (http://www.siemens.com/cert/advisories)",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
],
"url": "http://www.siemens.com/cert/advisories"
}
],
"scores": [
{
"cvss_v2": {
"baseScore": 10.0,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005",
"CSAFPID-0006",
"CSAFPID-0007",
"CSAFPID-0008",
"CSAFPID-0009"
]
}
]
}
]
}
CERTFR-2014-ALE-006
Vulnerability from certfr_alerte - Published: 2014-09-25 - Updated: 2014-09-30
Une vulnérabilité a été découverte dans GNU bash. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
La vulnérabilité CVE-2014-6271 consiste en une injection de commande suivant la définition d'une fonction dans une variable d'environnement. Dans certains cas, un processus peut hériter de variables d'environnement provenant d'une machine distante, ce qui rend cette vulnérabilité exploitable à distance. C'est notamment le cas de serveurs Web employant des scripts bash comme CGI-bin, de certains serveurs SSH et des clients DHCP.
Il est possible de vérifier si la version de bash est vulnérable avec la commande:
$ env VAR='() { 0; }; echo danger' bash -c "echo bonjour"
A l'heure actuelle, certains correctifs sont incomplets en raison d'une vulnérabilité résiduelle (CVE-2014-7169). Néanmoins le CERT-FR recommande d'appliquer les correctifs pour réduire la facilité d'exploitation. Les derniers correctifs des distributions Debian, Ubuntu et RedHat corrigent aussi CVE-2014-7169.
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | Bash versions antérieures au 25 septembre 2014 | ||
| N/A | N/A | GNU Bash 3.2 versions antérieures à 3.2.52 | ||
| Ubuntu | Ubuntu | Bash Ubuntu 10.04 LTS versions antérieures à 4.1-2ubuntu3.2 | ||
| Ubuntu | Ubuntu | Bash Ubuntu 12.04 LTS versions antérieures à 4.2-2ubuntu2.3 | ||
| Red Hat | Red Hat Enterprise Linux | Bash Red Hat Enterprise Linux 6 versions antérieures à bash-4.1.2-15.el6_5.2, bash-4.1.2-15.el6_5.1.sjis.1, bash-4.1.2-9.el6_2.1, bash-4.1.2-15.el6_4.1 | ||
| N/A | N/A | GNU Bash 4.1 versions antérieures à 4.1.12 | ||
| Red Hat | Red Hat Enterprise Linux | Bash Red Hat Enterprise Linux 5 versions antérieures à bash-3.2-33.el5_11.4, bash-3.2-33.el5_11.1.sjis.1, bash-3.2-24.el5_6.1, bash-3.2-32.el5_9.2 | ||
| Debian | N/A | Bash Debian Squeeze versions antérieures à 4.1-3+deb6u2 | ||
| N/A | N/A | GNU Bash 3.0 versions antérieures à 3.0.17 | ||
| N/A | N/A | GNU Bash 3.1 versions antérieures à 3.1.18 | ||
| Ubuntu | Ubuntu | Bash Ubuntu 14.04 LTS versions antérieures à 4.3-7ubuntu1.3 | ||
| N/A | N/A | GNU Bash 4.2 versions antérieures à 4.2.48 | ||
| Debian | N/A | Bash Debian Wheezy versions antérieures à 4.2+dfsg-0.1+deb7u3 | ||
| N/A | N/A | GNU Bash 4.3 versions antérieures à 4.3.25 | ||
| Red Hat | Red Hat Enterprise Linux | Bash Red Hat Enterprise Linux 7 versions antérieures à bash-4.2.45-5.el7_0.4 | ||
| N/A | N/A | GNU Bash 4.0 versions antérieures à 4.0.39 | ||
| Red Hat | Red Hat Enterprise Linux | Bash Red Hat Enterprise Linux 4 versions antérieures à bash-3.0-27.el4.2 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Bash versions ant\u00e9rieures au 25 septembre 2014",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "GNU Bash 3.2 versions ant\u00e9rieures \u00e0 3.2.52",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Bash Ubuntu 10.04 LTS versions ant\u00e9rieures \u00e0 4.1-2ubuntu3.2",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Bash Ubuntu 12.04 LTS versions ant\u00e9rieures \u00e0 4.2-2ubuntu2.3",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "Bash Red Hat Enterprise Linux 6 versions ant\u00e9rieures \u00e0 bash-4.1.2-15.el6_5.2, bash-4.1.2-15.el6_5.1.sjis.1, bash-4.1.2-9.el6_2.1, bash-4.1.2-15.el6_4.1",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "GNU Bash 4.1 versions ant\u00e9rieures \u00e0 4.1.12",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Bash Red Hat Enterprise Linux 5 versions ant\u00e9rieures \u00e0 bash-3.2-33.el5_11.4, bash-3.2-33.el5_11.1.sjis.1, bash-3.2-24.el5_6.1, bash-3.2-32.el5_9.2",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "Bash Debian Squeeze versions ant\u00e9rieures \u00e0 4.1-3+deb6u2",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "GNU Bash 3.0 versions ant\u00e9rieures \u00e0 3.0.17",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "GNU Bash 3.1 versions ant\u00e9rieures \u00e0 3.1.18",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Bash Ubuntu 14.04 LTS versions ant\u00e9rieures \u00e0 4.3-7ubuntu1.3",
"product": {
"name": "Ubuntu",
"vendor": {
"name": "Ubuntu",
"scada": false
}
}
},
{
"description": "GNU Bash 4.2 versions ant\u00e9rieures \u00e0 4.2.48",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Bash Debian Wheezy versions ant\u00e9rieures \u00e0 4.2+dfsg-0.1+deb7u3",
"product": {
"name": "N/A",
"vendor": {
"name": "Debian",
"scada": false
}
}
},
{
"description": "GNU Bash 4.3 versions ant\u00e9rieures \u00e0 4.3.25",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Bash Red Hat Enterprise Linux 7 versions ant\u00e9rieures \u00e0 bash-4.2.45-5.el7_0.4",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
},
{
"description": "GNU Bash 4.0 versions ant\u00e9rieures \u00e0 4.0.39",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Bash Red Hat Enterprise Linux 4 versions ant\u00e9rieures \u00e0 bash-3.0-27.el4.2",
"product": {
"name": "Red Hat Enterprise Linux",
"vendor": {
"name": "Red Hat",
"scada": false
}
}
}
],
"affected_systems_content": null,
"closed_at": "2014-09-30",
"content": "## Solution\n\nLa vuln\u00e9rabilit\u00e9 CVE-2014-6271 consiste en une injection de commande\nsuivant la d\u00e9finition d\u0027une fonction dans une variable d\u0027environnement.\nDans certains cas, un processus peut h\u00e9riter de variables\nd\u0027environnement provenant d\u0027une machine distante, ce qui rend cette\nvuln\u00e9rabilit\u00e9 exploitable \u00e0 distance. C\u0027est notamment le cas de serveurs\nWeb employant des scripts bash comme CGI-bin, de certains serveurs SSH\net des clients DHCP.\n\nIl est possible de v\u00e9rifier si la version de bash est vuln\u00e9rable avec la\ncommande:\n\n`$ env VAR=\u0027() { 0; }; echo danger\u0027 bash -c \"echo bonjour\"`\n\nA l\u0027heure actuelle, certains correctifs sont incomplets en raison d\u0027une\nvuln\u00e9rabilit\u00e9 r\u00e9siduelle (CVE-2014-7169). N\u00e9anmoins le CERT-FR\nrecommande d\u0027appliquer les correctifs pour r\u00e9duire la facilit\u00e9\nd\u0027exploitation. Les derniers correctifs des distributions Debian, Ubuntu\net RedHat corrigent aussi CVE-2014-7169.\n",
"cves": [
{
"name": "CVE-2014-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2014-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6277"
},
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2014-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
},
{
"name": "CVE-2014-6278",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6278"
}
],
"initial_release_date": "2014-09-25T00:00:00",
"last_revision_date": "2014-09-30T00:00:00",
"links": [],
"reference": "CERTFR-2014-ALE-006",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-25T00:00:00.000000"
},
{
"description": "mise \u00e0 jour.",
"revision_date": "2014-09-26T00:00:00.000000"
},
{
"description": "mise \u00e0 jour.",
"revision_date": "2014-09-29T00:00:00.000000"
},
{
"description": "mise \u00e0 jour.",
"revision_date": "2014-09-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans \u003cspan class=\"textit\"\u003eGNU\nbash\u003c/span\u003e. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans GNU bash",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat du 24 septembre 2014",
"url": "https://access.redhat.com/articles/1200223"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 RedHat du 26 septembre 2014",
"url": "https://rhn.redhat.com/errata/RHSA-2014-1306.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2362-1 du 24 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2362-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-3032-1 du 24 septembre 2014",
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-3035-1 du 25 septembre 2014",
"url": "http://www.debian.org/security/2014/dsa-3035"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2364-1 du 27 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2364-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2363-1 du 25 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2363-1/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Ubuntu USN-2363-2 du 25 septembre 2014",
"url": "http://www.ubuntu.com/usn/usn-2363-2/"
}
]
}
CERTFR-2021-ALE-001
Vulnerability from certfr_alerte - Published: 2021-02-02 - Updated: 2021-05-12
[Mise à jour du 30 avril 2021]
Le 29 avril 2021, dans un billet de blogue (cf. section Documentation), FireEye fait état de l'exploitation de la vulnérabilité CVE-2021-20016 par un groupe criminel dans le but de déployer plusieurs rançongiciels à l'encontre de différentes entités en Europe et en Amérique du Nord.
[Mise à jour du 22 février 2021]
Le 19 février 2021, SonicWall a publié un nouveau correctif pour les versions 10.x, mais aussi pour les versions 9.x non concernées par la vulnérabilité CVE-2021-20016 (cf. section Documentation).
Dans son communiqué, SonicWall indique que ce correctif contient, sans les préciser, des mesures de durcissement du code et invite ses clients à l'installer immédiatement.
[Mise à jour du 04 février 2021]
Le 03 février 2021, SonicWall a publié un correctif pour la vulnérabilité qui porte désormais l'identifiant CVE-2021-20016. Cette vulnérabilité permet à un attaquant non authentifié d'obtenir les informations de connexions, y compris celles des comptes administrateurs. L'attaquant peut alors prendre complètement la main sur l'équipement.
Cette nouvelle précision confirme qu'il est obligatoire de changer tous les mots de passe une fois le correctif appliqué.
[Publication initiale]
Le 01 février 2021, SonicWall a confirmé l'existence d'une vulnérabilité de type 0 jour dans leurs passerelles d'accès sécurisé SMA séries 100. Celle-ci affecte uniquement les versions 10.x.
Les risques liés à cette vulnérabilité ne sont pas précisés, mais sont jugés comme critiques par SonicWall.
SonicWall annonce la sortie d'un correctif pour le 02 février 2021 en fin de journée ou pour le début de matinée du 03 février 2021 en France.
A noter: Indépendamment de cet évènement, un code d'attaque exploitant la vulnérabilité CVE-2014-6271 (nommée Shellshock) présente dans les versions antérieures à 8.0.0.4 a été publié sur internet. Il est donc impératif de s'assurer que vous ne disposez plus d'équipements dans ces versions. Toutefois, les produits SMA séries 100 versions 9.x et 10.x ne sont pas vulnérables à la CVE-2014-6271.
Contournement provisoire
En attendant la sortie du correctif, SonicWall propose plusieurs mesures de contournement:
- Changer tous les mots de passe et activer l'authentification multi-facteurs ;
- Bloquer l'accès à l’équipement par un pare-feu ;
- Éteindre l'équipement ;
- Installer une version 9.x après avoir effectué une sauvegarde de ses réglages puis une réinitialisation aux paramètres d'usine.
Le CERT-FR précise que le simple fait de changer un mot de passe n'a pas d'utilité particulière dans le cas où un attaquant peut toujours exploiter une vulnérabilité et éventuellement contourner les mécanismes d'authentification.
Le renouvellement des mots de passe est toutefois conseillé, une fois les correctifs appliqués ou à défaut une fois les autres mesures de contournement mises en œuvre.
L'authentification multi-facteurs fait partie des bonnes pratiques et est toujours conseillée lorsque celle-ci est disponible.
Solution
Le CERT-FR recommande l'application du correctif de sécurité dans les plus brefs délais, la modification de tous les mots de passe ainsi que l'activation de l'authentification multi-facteurs.
Pour plus de renseignements, se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Sonicwall | Secure Mobile Access | SMA 200, SMA 210, SMA 400 et SMA 410 versions 10.x antérieures à 10.2.0.6-32sv | ||
| Sonicwall | Secure Mobile Access | SMA 200, SMA 210, SMA 400 et SMA 410 versions 9.x antérieures à 9.0.0.10-28sv | ||
| Sonicwall | Secure Mobile Access | SMA 500v (Azure, AWS, ESXi, HyperV) versions 10.x antérieures à 10.2.0.6-32sv | ||
| Sonicwall | Secure Mobile Access | SMA 500v (Azure, AWS, ESXi, HyperV) versions 9.x antérieures à 9.0.0.10-28sv |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "SMA 200, SMA 210, SMA 400 et SMA 410 versions 10.x ant\u00e9rieures \u00e0 10.2.0.6-32sv",
"product": {
"name": "Secure Mobile Access",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
},
{
"description": "SMA 200, SMA 210, SMA 400 et SMA 410 versions 9.x ant\u00e9rieures \u00e0 9.0.0.10-28sv",
"product": {
"name": "Secure Mobile Access",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
},
{
"description": "SMA 500v (Azure, AWS, ESXi, HyperV) versions 10.x ant\u00e9rieures \u00e0 10.2.0.6-32sv",
"product": {
"name": "Secure Mobile Access",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
},
{
"description": "SMA 500v (Azure, AWS, ESXi, HyperV) versions 9.x ant\u00e9rieures \u00e0 9.0.0.10-28sv",
"product": {
"name": "Secure Mobile Access",
"vendor": {
"name": "Sonicwall",
"scada": false
}
}
}
],
"affected_systems_content": "",
"closed_at": "2021-05-12",
"content": "## Contournement provisoire\n\n\nEn attendant la sortie du correctif, SonicWall propose plusieurs mesures\nde contournement:\n\n1. Changer tous les mots de passe et activer l\u0027authentification\n multi-facteurs ;\n2. Bloquer l\u0027acc\u00e8s \u00e0 l\u2019\u00e9quipement par un pare-feu ;\n3. \u00c9teindre l\u0027\u00e9quipement ;\n4. Installer une version 9.x apr\u00e8s avoir effectu\u00e9 une sauvegarde de ses\n r\u00e9glages puis une r\u00e9initialisation aux param\u00e8tres d\u0027usine.\n\nLe CERT-FR pr\u00e9cise que le simple fait de changer un mot de passe n\u0027a pas\nd\u0027utilit\u00e9 particuli\u00e8re dans le cas o\u00f9 un attaquant peut toujours\nexploiter une vuln\u00e9rabilit\u00e9 et \u00e9ventuellement contourner les m\u00e9canismes\nd\u0027authentification.\n\nLe renouvellement des mots de passe est toutefois conseill\u00e9, une fois\nles correctifs appliqu\u00e9s ou \u00e0 d\u00e9faut une fois les autres mesures de\ncontournement mises en \u0153uvre.\n\nL\u0027authentification multi-facteurs fait partie des bonnes pratiques et\nest toujours conseill\u00e9e lorsque celle-ci est disponible.\n\n## Solution\n\nLe CERT-FR recommande l\u0027application du correctif de s\u00e9curit\u00e9 dans les\nplus brefs d\u00e9lais, la modification de tous les mots de passe ainsi que\nl\u0027activation de l\u0027authentification multi-facteurs.\n\nPour plus de renseignements, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de\nl\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2021-20016",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20016"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
}
],
"initial_release_date": "2021-02-02T00:00:00",
"last_revision_date": "2021-05-12T00:00:00",
"links": [
{
"title": "Avis du CERT-FR CERTFR-2021-AVI-083 du 04 f\u00e9vrier 2021",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2021-AVI-083/"
},
{
"title": "Communiqu\u00e9 SonicWall du 19 f\u00e9vrier 2021",
"url": "https://www.sonicwall.com/support/product-notification/additional-sma-100-series-10-x-and-9-x-firmware-updates-required-updated-feb-19-2-p-m-cst/210122173415410/"
},
{
"title": "Billet de blogue FireEye du 29 avril 2021",
"url": "https://www.fireeye.com/blog/threat-research/2021/04/unc2447-sombrat-and-fivehands-ransomware-sophisticated-financial-threat.html"
}
],
"reference": "CERTFR-2021-ALE-001",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-02-02T00:00:00.000000"
},
{
"description": "Disponibilit\u00e9 du correctif, ajout de l\u0027identifiant CVE, obligation de changer les mots de passe.",
"revision_date": "2021-02-04T00:00:00.000000"
},
{
"description": "Ajout du communiqu\u00e9 SonicWall du 19 f\u00e9vrier 2021.",
"revision_date": "2021-02-22T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte. Cela ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
"revision_date": "2021-03-11T00:00:00.000000"
},
{
"description": "Ajout du billet de blogue FireEye du 29 avril 2021.",
"revision_date": "2021-04-30T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte. Cela ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
"revision_date": "2021-05-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "\u003cstrong\u003e\\[Mise \u00e0 jour du 30 avril 2021\\]\u003c/strong\u003e\n\nLe 29 avril 2021, dans un billet de blogue (cf. section Documentation),\nFireEye fait \u00e9tat de l\u0027exploitation de la vuln\u00e9rabilit\u00e9\u00a0CVE-2021-20016\npar un groupe criminel dans le but de d\u00e9ployer plusieurs ran\u00e7ongiciels \u00e0\nl\u0027encontre de diff\u00e9rentes entit\u00e9s en Europe et en Am\u00e9rique du Nord.\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 22 f\u00e9vrier 2021\\]\u003c/strong\u003e\n\nLe 19 f\u00e9vrier 2021, SonicWall a publi\u00e9 un nouveau correctif pour les\nversions 10.x, mais aussi pour les versions 9.x non concern\u00e9es par la\nvuln\u00e9rabilit\u00e9\u00a0CVE-2021-20016 (cf. section Documentation).\n\nDans son communiqu\u00e9, SonicWall indique que ce correctif contient, sans\nles pr\u00e9ciser, des mesures de durcissement du code et invite ses clients\n\u00e0 l\u0027installer imm\u00e9diatement.\n\n\u003cstrong\u003e\\[Mise \u00e0 jour du 04 f\u00e9vrier 2021\\]\u003c/strong\u003e\n\nLe 03 f\u00e9vrier 2021, SonicWall a publi\u00e9 un correctif pour la\nvuln\u00e9rabilit\u00e9 qui porte d\u00e9sormais l\u0027identifiant\u00a0CVE-2021-20016. Cette\nvuln\u00e9rabilit\u00e9 permet \u00e0 un attaquant non authentifi\u00e9 d\u0027obtenir les\ninformations de connexions, y compris celles des comptes\nadministrateurs. L\u0027attaquant peut alors prendre compl\u00e8tement la main sur\nl\u0027\u00e9quipement.\n\nCette nouvelle pr\u00e9cision\u00a0confirme qu\u0027il est obligatoire de changer tous\nles mots de passe une fois le correctif appliqu\u00e9.\n\n\u003cstrong\u003e\\[Publication initiale\\]\u003c/strong\u003e\n\nLe 01 f\u00e9vrier 2021, SonicWall a confirm\u00e9 l\u0027existence d\u0027une vuln\u00e9rabilit\u00e9\nde type 0 jour dans leurs passerelles d\u0027acc\u00e8s s\u00e9curis\u00e9 SMA s\u00e9ries 100.\nCelle-ci affecte uniquement les versions 10.x.\n\nLes risques li\u00e9s \u00e0 cette vuln\u00e9rabilit\u00e9 ne sont pas pr\u00e9cis\u00e9s, mais sont\njug\u00e9s comme critiques par SonicWall.\n\nSonicWall annonce la sortie d\u0027un correctif pour le 02 f\u00e9vrier 2021 en\nfin de journ\u00e9e ou pour le d\u00e9but de matin\u00e9e du 03 f\u00e9vrier 2021 en France.\n\nA noter: Ind\u00e9pendamment de cet \u00e9v\u00e8nement, un code d\u0027attaque exploitant\nla vuln\u00e9rabilit\u00e9 CVE-2014-6271 (nomm\u00e9e *Shellshock*) pr\u00e9sente dans les\nversions ant\u00e9rieures \u00e0 8.0.0.4 a \u00e9t\u00e9 publi\u00e9 sur internet. Il est donc\nimp\u00e9ratif de s\u0027assurer que vous ne disposez plus d\u0027\u00e9quipements dans ces\nversions. Toutefois, les produits SMA s\u00e9ries 100 versions 9.x et 10.x ne\nsont pas vuln\u00e9rables \u00e0 la CVE-2014-6271.\n",
"title": "|M\u00e0J] Vuln\u00e9rabilit\u00e9 dans SonicWall SMA100",
"vendor_advisories": [
{
"published_at": "2021-02-01",
"title": "Communiqu\u00e9 SonicWall",
"url": "https://www.sonicwall.com/support/product-notification/urgent-security-notice-sonicwall-confirms-sma-100-series-10-x-zero-day-vulnerability-feb-1-2-p-m-cst/210122173415410/"
},
{
"published_at": "2021-01-23",
"title": "Bulletin de s\u00e9curit\u00e9 SonicWall SNWLID-2021-0001",
"url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0001"
}
]
}
CERTFR-2014-AVI-404
Vulnerability from certfr_avis - Published: 2014-09-30 - Updated: 2014-09-30
De multiples vulnérabilités ont été corrigées dans Blue Coat. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Broadcom | N/A | MAA 1.1.x et 4.1.x | ||
| Broadcom | N/A | Director 6.x et 5.x | ||
| Broadcom | Management Center | Management Center 1.1 et 1.2 | ||
| Broadcom | Reporter | Reporter's ISO 9.4 | ||
| Broadcom | N/A | SA 7.1, 7.0, et 6.x | ||
| Broadcom | N/A | CAS 1.x | ||
| Broadcom | N/A | XOS | ||
| Broadcom | N/A | S-Series | ||
| Broadcom | N/A | MAG2 | ||
| Broadcom | N/A | SSL Visibility |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MAA 1.1.x et 4.1.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Director 6.x et 5.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Management Center 1.1 et 1.2",
"product": {
"name": "Management Center",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "Reporter\u0027s ISO 9.4",
"product": {
"name": "Reporter",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SA 7.1, 7.0, et 6.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "CAS 1.x",
"product": {
"name": "N/A",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "XOS",
"product": {
"name": "N/A",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "S-Series",
"product": {
"name": "N/A",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "MAG2",
"product": {
"name": "N/A",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
},
{
"description": "SSL Visibility",
"product": {
"name": "N/A",
"vendor": {
"name": "Broadcom",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
}
],
"initial_release_date": "2014-09-30T00:00:00",
"last_revision_date": "2014-09-30T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-404",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eBlue Coat\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Blue Coat",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Blue Coat SA82 du 25 septembre 2014",
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
}
]
}
CERTFR-2014-AVI-444
Vulnerability from certfr_avis - Published: 2014-10-27 - Updated: 2014-10-27
De multiples vulnérabilités ont été corrigées dans les produits Huawei. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Contournement provisoire
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | VAE V100R001C01 | ||
| N/A | N/A | OMM V100R001 | ||
| N/A | N/A | ManageOne V100R001C01 (BMS), V100R001C02 (SSMC), V100R002C00 (SSM), V100R002C00 (UMP), V100R002C10 (SSM), V100R002C10 (OC), V100R002C10 (SC), V100R002C20 (OC), V100R002C20 (SC) | ||
| N/A | N/A | UMA V100R001 | ||
| N/A | N/A | SIG9800 | ||
| N/A | N/A | eSight V100R001C01/C20, V200R003C01/C10 | ||
| N/A | N/A | OceanStor 18500, 18800, 18800F, 9000, 9000E, CSE, CSS, Dorado, HVS85T, HVS88T, SXX00 jusqu'à S6800 | ||
| N/A | N/A | eLog V100R003 | ||
| N/A | N/A | DC V100R002 | ||
| N/A | N/A | eSpace V100R001 | ||
| N/A | N/A | NVS V100R002 | ||
| N/A | N/A | OIC V100R001C00 | ||
| N/A | N/A | AgileController-Campus V100R001 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VAE V100R001C01",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "OMM V100R001",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ManageOne V100R001C01 (BMS), V100R001C02 (SSMC), V100R002C00 (SSM), V100R002C00 (UMP), V100R002C10 (SSM), V100R002C10 (OC), V100R002C10 (SC), V100R002C20 (OC), V100R002C20 (SC)",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "UMA V100R001",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "SIG9800",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "eSight V100R001C01/C20, V200R003C01/C10",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "OceanStor 18500, 18800, 18800F, 9000, 9000E, CSE, CSS, Dorado, HVS85T, HVS88T, SXX00 jusqu\u0027\u00e0 S6800",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "eLog V100R003",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "DC V100R002",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "eSpace V100R001",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "NVS V100R002",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "OIC V100R001C00",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "AgileController-Campus V100R001",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Contournement provisoire\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
},
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2014-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6277"
},
{
"name": "CVE-2014-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
},
{
"name": "CVE-2014-6278",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6278"
}
],
"initial_release_date": "2014-10-27T00:00:00",
"last_revision_date": "2014-10-27T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-444",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-10-27T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eHuawei\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Huawei",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Huawei du 24 octobre 2014",
"url": "http://www.huawei.com/en/security/psirt/security-bulletins/security-advisories/hw-377648.htm"
}
]
}
CERTFR-2014-AVI-415
Vulnerability from certfr_avis - Published: 2014-10-13 - Updated: 2014-10-13
De multiples vulnérabilités ont été corrigées dans les systèmes SCADA de Siemens. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ROX 2 version inf\u00e9rieure \u00e0 2.6.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "APE Linux 1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
},
{
"description": "ROX 1 jusqu\u0027\u00e0 la version 1.16.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Siemens",
"scada": true
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
},
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2014-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6277"
},
{
"name": "CVE-2014-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
},
{
"name": "CVE-2014-6278",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6278"
}
],
"initial_release_date": "2014-10-13T00:00:00",
"last_revision_date": "2014-10-13T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-415",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-10-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les syst\u00e8mes SCADA de\n\u003cspan class=\"textit\"\u003eSiemens\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les syst\u00e8mes SCADA Siemens",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Siemens SSA-860967 du 06 octobre 2014",
"url": "https://www.siemens.com/innovation/pool/de/forschungsfelder/siemens_security_advisory_ssa-860967.pdf"
}
]
}
CERTFR-2014-AVI-436
Vulnerability from certfr_avis - Published: 2014-10-17 - Updated: 2014-10-20
De multiples vulnérabilités ont été corrigées dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "OS X Mavericks versions ant\u00e9rieures \u00e0 10.9.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "OS X Mountain Lion versions ant\u00e9rieures \u00e0 10.8.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "OS X Yosemite versions ant\u00e9rieures \u00e0 10.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "OS X Server versions ant\u00e9rieures \u00e0 2.2.5, 3.2.2 et 4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-4433",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4433"
},
{
"name": "CVE-2014-4424",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4424"
},
{
"name": "CVE-2014-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
},
{
"name": "CVE-2013-5150",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5150"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2014-4425",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4425"
},
{
"name": "CVE-2014-4375",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4375"
},
{
"name": "CVE-2014-4406",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4406"
},
{
"name": "CVE-2014-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
},
{
"name": "CVE-2014-4418",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4418"
},
{
"name": "CVE-2013-4164",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4164"
},
{
"name": "CVE-2014-4440",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4440"
},
{
"name": "CVE-2014-4446",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4446"
},
{
"name": "CVE-2014-4422",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4422"
},
{
"name": "CVE-2014-4380",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4380"
},
{
"name": "CVE-2014-4364",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4364"
},
{
"name": "CVE-2014-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4447"
},
{
"name": "CVE-2013-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-3919"
},
{
"name": "CVE-2014-4444",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4444"
},
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2013-6393",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6393"
},
{
"name": "CVE-2014-4405",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4405"
},
{
"name": "CVE-2014-4441",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4441"
},
{
"name": "CVE-2014-4438",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4438"
},
{
"name": "CVE-2014-0098",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0098"
},
{
"name": "CVE-2014-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4421"
},
{
"name": "CVE-2014-4432",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4432"
},
{
"name": "CVE-2014-4430",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4430"
},
{
"name": "CVE-2014-4426",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4426"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2014-4404",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4404"
},
{
"name": "CVE-2014-4417",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4417"
},
{
"name": "CVE-2014-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4435"
},
{
"name": "CVE-2014-4391",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4391"
},
{
"name": "CVE-2014-4419",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4419"
},
{
"name": "CVE-2014-4420",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4420"
},
{
"name": "CVE-2014-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3537"
},
{
"name": "CVE-2014-4427",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4427"
},
{
"name": "CVE-2014-4408",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4408"
},
{
"name": "CVE-2014-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
},
{
"name": "CVE-2014-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
},
{
"name": "CVE-2014-4407",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4407"
},
{
"name": "CVE-2014-4428",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4428"
},
{
"name": "CVE-2014-4437",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4437"
},
{
"name": "CVE-2014-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0591"
},
{
"name": "CVE-2014-4431",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4431"
},
{
"name": "CVE-2014-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
},
{
"name": "CVE-2014-4371",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4371"
},
{
"name": "CVE-2014-4436",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4436"
},
{
"name": "CVE-2014-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4373"
},
{
"name": "CVE-2013-6438",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6438"
},
{
"name": "CVE-2014-4442",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4442"
},
{
"name": "CVE-2014-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
},
{
"name": "CVE-2014-4443",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4443"
},
{
"name": "CVE-2013-4854",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4854"
},
{
"name": "CVE-2014-4434",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4434"
},
{
"name": "CVE-2014-4388",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4388"
},
{
"name": "CVE-2011-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2391"
},
{
"name": "CVE-2014-4351",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4351"
},
{
"name": "CVE-2014-4439",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4439"
},
{
"name": "CVE-2014-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
}
],
"initial_release_date": "2014-10-17T00:00:00",
"last_revision_date": "2014-10-20T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-436",
"revisions": [
{
"description": "version initiale ;",
"revision_date": "2014-10-17T00:00:00.000000"
},
{
"description": "correction des versions affect\u00e9es.",
"revision_date": "2014-10-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eApple\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une\nex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6535 du 16 octobre 2014",
"url": "https://support.apple.com/kb/HT6535"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6531 du 16 octobre 2014",
"url": "https://support.apple.com/kb/HT6531"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6529 du 16 octobre 2014",
"url": "https://support.apple.com/kb/HT6529"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6536 du 16 octobre 2014",
"url": "https://support.apple.com/kb/HT6536"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6527 du 16 octobre 2014",
"url": "https://support.apple.com/kb/HT6527"
}
]
}
CERTFR-2014-AVI-403
Vulnerability from certfr_avis - Published: 2014-09-30 - Updated: 2014-09-30
De multiples vulnérabilités ont été corrigées dans Juniper. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | NSM Appliances (NSM3000 and NSMExpress) | ||
| N/A | N/A | JSA Series (STRM) | ||
| Juniper Networks | Junos Space | Junos Space |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NSM Appliances (NSM3000 and NSMExpress)",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "JSA Series (STRM)",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Junos Space",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
},
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2014-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
}
],
"initial_release_date": "2014-09-30T00:00:00",
"last_revision_date": "2014-09-30T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-403",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10648 du 27 septembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648"
}
]
}
CERTFR-2015-AVI-146
Vulnerability from certfr_avis - Published: 2015-04-13 - Updated: 2015-04-13
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | Juniper NSM versions antérieures à 2012.2R12 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R9 | ||
| Juniper Networks | N/A | Juniper CTPOS versions antérieures à 6.6R5 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.2X50-D70 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 11.4R12 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2X51-D30 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R7 | ||
| Juniper Networks | N/A | Juniper NSM versions antérieures à 2012.2R11 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3R10 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2R6 | ||
| Juniper Networks | N/A | Juniper CTPView versions antérieures à 7.1R1 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.3R6 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.2R1 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.3X48-D10 | ||
| Juniper Networks | N/A | Juniper CTPOS versions antérieures à 7.0R4 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1X53-D10 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X46-D35 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X47-D25 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1R5 | ||
| Juniper Networks | N/A | Juniper CTPOS versions antérieures à 7.1R1 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.1X44-D50 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.3R5 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2X52-D15 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.1R3 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 14.2R3 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.2R8 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 12.2R9 | ||
| Juniper Networks | Junos OS | Juniper Junos OS versions antérieures à 13.1X50-D30 | ||
| Juniper Networks | N/A | Juniper IDP OS versions antérieures à 5.1r4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper NSM versions ant\u00e9rieures \u00e0 2012.2R12",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 6.6R5",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.2X50-D70",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 11.4R12",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2X51-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R7",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper NSM versions ant\u00e9rieures \u00e0 2012.2R11",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3R10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper CTPView versions ant\u00e9rieures \u00e0 7.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.3R6",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.3X48-D10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 7.0R4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1X53-D10",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X46-D35",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X47-D25",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper CTPOS versions ant\u00e9rieures \u00e0 7.1R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.1X44-D50",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.3R5",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2X52-D15",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.1R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 14.2R3",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.2R8",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 12.2R9",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Junos OS versions ant\u00e9rieures \u00e0 13.1X50-D30",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper IDP OS versions ant\u00e9rieures \u00e0 5.1r4",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2015-0208",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0208"
},
{
"name": "CVE-2015-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0292"
},
{
"name": "CVE-2014-3571",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3571"
},
{
"name": "CVE-2015-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0286"
},
{
"name": "CVE-2015-3002",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3002"
},
{
"name": "CVE-2014-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3570"
},
{
"name": "CVE-2015-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3004"
},
{
"name": "CVE-2009-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3563"
},
{
"name": "CVE-2015-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0288"
},
{
"name": "CVE-2015-0206",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0206"
},
{
"name": "CVE-2015-0290",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0290"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2011-0539",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0539"
},
{
"name": "CVE-2015-0207",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0207"
},
{
"name": "CVE-2010-4478",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4478"
},
{
"name": "CVE-2015-0285",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0285"
},
{
"name": "CVE-2014-4478",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4478"
},
{
"name": "CVE-2015-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3003"
},
{
"name": "CVE-2012-0814",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0814"
},
{
"name": "CVE-2015-0204",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0204"
},
{
"name": "CVE-2015-0293",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0293"
},
{
"name": "CVE-2015-0287",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0287"
},
{
"name": "CVE-2015-1787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1787"
},
{
"name": "CVE-2014-8275",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8275"
},
{
"name": "CVE-2015-0205",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0205"
},
{
"name": "CVE-2015-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0209"
},
{
"name": "CVE-2015-0291",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0291"
},
{
"name": "CVE-2015-0289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0289"
},
{
"name": "CVE-2014-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3572"
},
{
"name": "CVE-2014-3569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3569"
},
{
"name": "CVE-2015-3005",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3005"
},
{
"name": "CVE-2014-8500",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8500"
},
{
"name": "CVE-2012-2131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2131"
},
{
"name": "CVE-2015-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-3006"
}
],
"initial_release_date": "2015-04-13T00:00:00",
"last_revision_date": "2015-04-13T00:00:00",
"links": [],
"reference": "CERTFR-2015-AVI-146",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-04-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\nd\u00e9ni de service \u00e0 distance et un d\u00e9ni de service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10679 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10679"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10676 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10676"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10673 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10672 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10672"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10680 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10680"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10677 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10677"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10678 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10678"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10675 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10675"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10674 du 07 avril 2015",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10674"
}
]
}
CERTFR-2014-AVI-405
Vulnerability from certfr_avis - Published: 2014-09-30 - Updated: 2014-09-30
De multiples vulnérabilités ont été corrigées dans Apple OS X bash. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
versions antérieures à OS X bash Update 1.0
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eversions ant\u00e9rieures \u00e0 OS X bash Update 1.0\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
}
],
"initial_release_date": "2014-09-30T00:00:00",
"last_revision_date": "2014-09-30T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-405",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-09-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApple OS X bash\u003c/span\u003e. Elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apple OS X bash",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apple HT6495 du 29 septembre 2014",
"url": "http://support.apple.com/kb/HT6495"
}
]
}
CERTFR-2014-AVI-480
Vulnerability from certfr_avis - Published: 2014-11-13 - Updated: 2014-11-13
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | N/A | CTPOS versions antérieures à 6.6R2 | ||
| ESET | Security | Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2 | ||
| Juniper Networks | N/A | CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6 | ||
| Juniper Networks | Junos Space | Junos Space jusqu'à la version 13.3 | ||
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2 | ||
| ESET | Security | Network and Security Manager (NSM) version 2012.2 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "CTPOS versions ant\u00e9rieures \u00e0 6.6R2",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Security Threat Response Manager versions 2012.1, 2013.1, 2013.2",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
},
{
"description": "CTPView versions 4.2, 4.3, 4.4, 4.5, 4.6",
"product": {
"name": "N/A",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos Space jusqu\u0027\u00e0 la version 13.3",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Juniper Secure Analytics versions 2013.2, 2014.1, 2014.2",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Network and Security Manager (NSM) version 2012.2",
"product": {
"name": "Security",
"vendor": {
"name": "ESET",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2012-3158",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3158"
},
{
"name": "CVE-2010-3853",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3853"
},
{
"name": "CVE-2014-0075",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0075"
},
{
"name": "CVE-2010-3081",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3081"
},
{
"name": "CVE-2012-0789",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0789"
},
{
"name": "CVE-2012-2329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2329"
},
{
"name": "CVE-2014-0460",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0460"
},
{
"name": "CVE-2011-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4609"
},
{
"name": "CVE-2011-0421",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0421"
},
{
"name": "CVE-2012-0781",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0781"
},
{
"name": "CVE-2014-4827",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4827"
},
{
"name": "CVE-2013-1635",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1635"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2013-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1620"
},
{
"name": "CVE-2014-0119",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0119"
},
{
"name": "CVE-2012-2110",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2110"
},
{
"name": "CVE-2014-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2012-0788",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0788"
},
{
"name": "CVE-2010-4755",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4755"
},
{
"name": "CVE-2013-1775",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1775"
},
{
"name": "CVE-2009-5029",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-5029"
},
{
"name": "CVE-2011-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1153"
},
{
"name": "CVE-2009-3563",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3563"
},
{
"name": "CVE-2014-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0411"
},
{
"name": "CVE-2013-1643",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1643"
},
{
"name": "CVE-2013-0791",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0791"
},
{
"name": "CVE-2010-1646",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1646"
},
{
"name": "CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2014-0099",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0099"
},
{
"name": "CVE-2011-0010",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0010"
},
{
"name": "CVE-2011-1398",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1398"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2014-4825",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4825"
},
{
"name": "CVE-2010-4707",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4707"
},
{
"name": "CVE-2012-0882",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0882"
},
{
"name": "CVE-2009-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0159"
},
{
"name": "CVE-2014-0453",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0453"
},
{
"name": "CVE-2011-0708",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0708"
},
{
"name": "CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"name": "CVE-2014-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6277"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2010-0830",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0830"
},
{
"name": "CVE-2010-0426",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0426"
},
{
"name": "CVE-2014-0423",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0423"
},
{
"name": "CVE-2012-2311",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2311"
},
{
"name": "CVE-2014-0224",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0224"
},
{
"name": "CVE-2014-4830",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4830"
},
{
"name": "CVE-2011-3368",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3368"
},
{
"name": "CVE-2014-2532",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2532"
},
{
"name": "CVE-2014-4828",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4828"
},
{
"name": "CVE-2014-0095",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0095"
},
{
"name": "CVE-2010-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0427"
},
{
"name": "CVE-2014-3470",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3470"
},
{
"name": "CVE-2014-3062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3062"
},
{
"name": "CVE-2012-0831",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0831"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2012-0057",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0057"
},
{
"name": "CVE-2014-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
},
{
"name": "CVE-2010-2956",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2956"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2014-4833",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4833"
},
{
"name": "CVE-2011-4566",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4566"
},
{
"name": "CVE-2014-0837",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0837"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2014-6278",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6278"
},
{
"name": "CVE-2012-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-1172"
},
{
"name": "CVE-2014-0076",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0076"
},
{
"name": "CVE-2010-1163",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1163"
},
{
"name": "CVE-2011-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4317"
},
{
"name": "CVE-2011-4885",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-4885"
},
{
"name": "CVE-2010-5107",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-5107"
},
{
"name": "CVE-2009-1265",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1265"
},
{
"name": "CVE-2010-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3316"
},
{
"name": "CVE-2012-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3510"
},
{
"name": "CVE-2011-5000",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-5000"
},
{
"name": "CVE-2010-3435",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3435"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-2337",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2337"
},
{
"name": "CVE-2011-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
},
{
"name": "CVE-2014-0096",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0096"
},
{
"name": "CVE-2013-5908",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5908"
},
{
"name": "CVE-2014-3091",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3091"
},
{
"name": "CVE-2012-2131",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2131"
}
],
"initial_release_date": "2014-11-13T00:00:00",
"last_revision_date": "2014-11-13T00:00:00",
"links": [],
"reference": "CERTFR-2014-AVI-480",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-11-13T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une\nex\u00e9cution de code arbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10661 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10657 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10657"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10658 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10658"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10659 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10659"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10660 du 11 novembre 2014",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10660"
}
]
}
JVNDB-2014-000126
Vulnerability from jvndb - Published: 2014-10-28 14:39 - Updated:2015-12-25 13:47| Type | URL | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
| Vendor | Product | |
|---|---|---|
{
"@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html",
"dc:date": "2015-12-25T13:47+09:00",
"dcterms:issued": "2014-10-28T14:39+09:00",
"dcterms:modified": "2015-12-25T13:47+09:00",
"description": "QNAP QTS is an operating system for Turbo NAS. QNAP QTS contains a flaw in the GNU Bash shell, which may result in an OS command injection vulnerability (CWE-78).\r\n\r\nYuuki Wakisaka of University of Electro-Communications reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
"link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000126.html",
"sec:cpe": {
"#text": "cpe:/o:qnap:qts",
"@product": "QNAP QTS",
"@vendor": "QNAP Systems",
"@version": "2.2"
},
"sec:cvss": {
"@score": "10.0",
"@severity": "High",
"@type": "Base",
"@vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"@version": "2.0"
},
"sec:identifier": "JVNDB-2014-000126",
"sec:references": [
{
"#text": "http://jvn.jp/en/jp/JVN55667175/index.html",
"@id": "JVN#55667175",
"@source": "JVN"
},
{
"#text": "https://jvn.jp/vu/JVNVU97219505/index.html",
"@id": "JVNVU#97219505",
"@source": "JVN"
},
{
"#text": "http://jvn.jp/vu/JVNVU97220341/index.html",
"@id": "JVNVU#97220341",
"@source": "JVN"
},
{
"#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004399.html",
"@id": "JVNDB-2014-004399",
"@source": "JVN iPedia"
},
{
"#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004410.html",
"@id": "JVNDB-2014-004410",
"@source": "JVN iPedia"
},
{
"#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004431.html",
"@id": "JVNDB-2014-004431",
"@source": "JVN iPedia"
},
{
"#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004476.html",
"@id": "JVNDB-2014-004476",
"@source": "JVN iPedia"
},
{
"#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004432.html",
"@id": "JVNDB-2014-004432",
"@source": "JVN iPedia"
},
{
"#text": "http://jvndb.jvn.jp/ja/contents/2014/JVNDB-2014-004433.html",
"@id": "JVNDB-2014-004433",
"@source": "JVN iPedia"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7169",
"@id": "CVE-2014-7169",
"@source": "CVE"
},
{
"#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271",
"@id": "CVE-2014-6271",
"@source": "CVE"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6277",
"@id": "CVE-2014-6277",
"@source": "CVE"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6278",
"@id": "CVE-2014-6278",
"@source": "CVE"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7186",
"@id": "CVE-2014-7186",
"@source": "CVE"
},
{
"#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7187",
"@id": "CVE-2014-7187",
"@source": "CVE"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7169",
"@id": "CVE-2014-7169",
"@source": "NVD"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6271",
"@id": "CVE-2014-6271",
"@source": "NVD"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6277",
"@id": "CVE-2014-6277",
"@source": "NVD"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-6278",
"@id": "CVE-2014-6278",
"@source": "NVD"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7186",
"@id": "CVE-2014-7186",
"@source": "NVD"
},
{
"#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187",
"@id": "CVE-2014-7187",
"@source": "NVD"
},
{
"#text": "http://www.kb.cert.org/vuls/id/252743",
"@id": "VU#252743",
"@source": "CERT-VN"
},
{
"#text": "https://ics-cert.us-cert.gov/advisories/ICSA-15-344-01",
"@id": "ICSA-15-344-01",
"@source": "ICS-CERT ADVISORY"
},
{
"#text": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a",
"@id": "ICSA-14-269-01A",
"@source": "ICS-CERT ADVISORY"
},
{
"#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
"@id": "CWE-78",
"@title": "OS Command Injection(CWE-78)"
}
],
"title": "QNAP QTS vulnerable to OS command injection"
}
SUSE-SU-2017:2699-1
Vulnerability from csaf_suse - Published: 2017-10-10 19:37 - Updated: 2017-10-10 19:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SLES 12 Docker image",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise Server 12 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nutil-linux:\n\n- CVE-2015-5218\n- CVE-2016-5011\n- CVE-2017-2616\n\ncracklib:\n\n- CVE-2016-6318\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- openldap2\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- shadow\n- zypper\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Containers-12-2017-1672",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2699-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:2699-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172699-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:2699-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003288.html"
},
{
"category": "self",
"summary": "SUSE Bug 1056193",
"url": "https://bugzilla.suse.com/1056193"
},
{
"category": "self",
"summary": "SUSE Bug 975726",
"url": "https://bugzilla.suse.com/975726"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-6702 page",
"url": "https://www.suse.com/security/cve/CVE-2012-6702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0191 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6271 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6277 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6278 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7169 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7187 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7824 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8964 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9770 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0245 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1283 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2059 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2325 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2327 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2328 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3210 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3217 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3238 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3622 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5073 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5218 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5218/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5276 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5276/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7511 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8380 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8381 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8382 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8383 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8384 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8385 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8386 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8387 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8388 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8389 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8390 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8391 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8392 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8393 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8394 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8395 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8806 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8842 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8853 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8948 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0634 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0634/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0718 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0787 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0787/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1234 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1238 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1283 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1762 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1833 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1834 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1835 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1837 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1838 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1839 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1840 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2037 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2073 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2107 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2108 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2109 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2177 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2178 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2179 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2180 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2181 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2182 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2381 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3075 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3191 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3627 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3705 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3705/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3706 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3706/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4008 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4429 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4447 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4448 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4449 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4483 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4574 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4574/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4579 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4658 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4658/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5011 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5300 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5419 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5420 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5421 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6185 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6261 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6262 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6263 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6302 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6303 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6304 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6306 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6313 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6313/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6318 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7141 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7167 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7543 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7796 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8615 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8616 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8617 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8618 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8619 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8620 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8621 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8622 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8623 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8624 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9063 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9318 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9586 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9597 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9840 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9841 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9841/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9842 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9843 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000100 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000101 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10684 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10685 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11112 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11113 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2616 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6507 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7407 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7526 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9047 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9048 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9049 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9050 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9050/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9233 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9233/"
}
],
"title": "Security update for SLES 12 Docker image",
"tracking": {
"current_release_date": "2017-10-10T19:37:24Z",
"generator": {
"date": "2017-10-10T19:37:24Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:2699-1",
"initial_release_date": "2017-10-10T19:37:24Z",
"revision_history": [
{
"date": "2017-10-10T19:37:24Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "sles12-docker-image-1.1.4-20171002.ppc64le",
"product": {
"name": "sles12-docker-image-1.1.4-20171002.ppc64le",
"product_id": "sles12-docker-image-1.1.4-20171002.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "sles12-docker-image-1.1.4-20171002.s390x",
"product": {
"name": "sles12-docker-image-1.1.4-20171002.s390x",
"product_id": "sles12-docker-image-1.1.4-20171002.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "sles12-docker-image-1.1.4-20171002.x86_64",
"product": {
"name": "sles12-docker-image-1.1.4-20171002.x86_64",
"product_id": "sles12-docker-image-1.1.4-20171002.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 12",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12-docker-image-1.1.4-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le"
},
"product_reference": "sles12-docker-image-1.1.4-20171002.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12-docker-image-1.1.4-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x"
},
"product_reference": "sles12-docker-image-1.1.4-20171002.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12-docker-image-1.1.4-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
},
"product_reference": "sles12-docker-image-1.1.4-20171002.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-6702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-6702"
}
],
"notes": [
{
"category": "general",
"text": "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-6702",
"url": "https://www.suse.com/security/cve/CVE-2012-6702"
},
{
"category": "external",
"summary": "SUSE Bug 983215 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983215"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2012-6702"
},
{
"cve": "CVE-2014-0191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0191"
}
],
"notes": [
{
"category": "general",
"text": "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0191",
"url": "https://www.suse.com/security/cve/CVE-2014-0191"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 876652 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/876652"
},
{
"category": "external",
"summary": "SUSE Bug 877506 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/877506"
},
{
"category": "external",
"summary": "SUSE Bug 996079 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/996079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-0191"
},
{
"cve": "CVE-2014-6271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6271"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6271",
"url": "https://www.suse.com/security/cve/CVE-2014-6271"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-6271"
},
{
"cve": "CVE-2014-6277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6277"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6277",
"url": "https://www.suse.com/security/cve/CVE-2014-6277"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-6277"
},
{
"cve": "CVE-2014-6278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6278"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6278",
"url": "https://www.suse.com/security/cve/CVE-2014-6278"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/900127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-6278"
},
{
"cve": "CVE-2014-7169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7169"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7169",
"url": "https://www.suse.com/security/cve/CVE-2014-7169"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899039"
},
{
"category": "external",
"summary": "SUSE Bug 899266 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899266"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900454"
},
{
"category": "external",
"summary": "SUSE Bug 902237 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/902237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2014-7169"
},
{
"cve": "CVE-2014-7187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7187"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7187",
"url": "https://www.suse.com/security/cve/CVE-2014-7187"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 898603 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898603"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/899039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2014-7187"
},
{
"cve": "CVE-2014-7824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7824"
}
],
"notes": [
{
"category": "general",
"text": "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7824",
"url": "https://www.suse.com/security/cve/CVE-2014-7824"
},
{
"category": "external",
"summary": "SUSE Bug 904017 for CVE-2014-7824",
"url": "https://bugzilla.suse.com/904017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2014-7824"
},
{
"cve": "CVE-2014-8964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8964"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8964",
"url": "https://www.suse.com/security/cve/CVE-2014-8964"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 924960 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/924960"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 936408 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/936408"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2014-8964"
},
{
"cve": "CVE-2014-9770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9770"
}
],
"notes": [
{
"category": "general",
"text": "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9770",
"url": "https://www.suse.com/security/cve/CVE-2014-9770"
},
{
"category": "external",
"summary": "SUSE Bug 972612 for CVE-2014-9770",
"url": "https://bugzilla.suse.com/972612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2014-9770"
},
{
"cve": "CVE-2015-0245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0245"
}
],
"notes": [
{
"category": "general",
"text": "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0245",
"url": "https://www.suse.com/security/cve/CVE-2015-0245"
},
{
"category": "external",
"summary": "SUSE Bug 1003898 for CVE-2015-0245",
"url": "https://bugzilla.suse.com/1003898"
},
{
"category": "external",
"summary": "SUSE Bug 916343 for CVE-2015-0245",
"url": "https://bugzilla.suse.com/916343"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-0245"
},
{
"cve": "CVE-2015-1283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1283"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1283",
"url": "https://www.suse.com/security/cve/CVE-2015-1283"
},
{
"category": "external",
"summary": "SUSE Bug 1034050 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/1034050"
},
{
"category": "external",
"summary": "SUSE Bug 939077 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/939077"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 980391 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/980391"
},
{
"category": "external",
"summary": "SUSE Bug 983985 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/983985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-1283"
},
{
"cve": "CVE-2015-2059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2059"
}
],
"notes": [
{
"category": "general",
"text": "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2059",
"url": "https://www.suse.com/security/cve/CVE-2015-2059"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 919214 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/919214"
},
{
"category": "external",
"summary": "SUSE Bug 923241 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/923241"
},
{
"category": "external",
"summary": "SUSE Bug 937096 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/937096"
},
{
"category": "external",
"summary": "SUSE Bug 937097 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/937097"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-2059"
},
{
"cve": "CVE-2015-2325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2325"
}
],
"notes": [
{
"category": "general",
"text": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2325",
"url": "https://www.suse.com/security/cve/CVE-2015-2325"
},
{
"category": "external",
"summary": "SUSE Bug 924960 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/924960"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 936408 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/936408"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-2325"
},
{
"cve": "CVE-2015-2327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2327"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g\u003c-1\u003e))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2327",
"url": "https://www.suse.com/security/cve/CVE-2015-2327"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-2327",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957567 for CVE-2015-2327",
"url": "https://bugzilla.suse.com/957567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-2327"
},
{
"cve": "CVE-2015-2328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2328"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2328",
"url": "https://www.suse.com/security/cve/CVE-2015-2328"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-2328",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957600 for CVE-2015-2328",
"url": "https://bugzilla.suse.com/957600"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-2328"
},
{
"cve": "CVE-2015-3210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3210"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P\u003cB\u003ec)(?P\u003cB\u003ea(?P=B)))\u003eWGXCREDITS)/, a different vulnerability than CVE-2015-8384.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3210",
"url": "https://www.suse.com/security/cve/CVE-2015-3210"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-3210"
},
{
"cve": "CVE-2015-3217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3217"
}
],
"notes": [
{
"category": "general",
"text": "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3217",
"url": "https://www.suse.com/security/cve/CVE-2015-3217"
},
{
"category": "external",
"summary": "SUSE Bug 933878 for CVE-2015-3217",
"url": "https://bugzilla.suse.com/933878"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-3217",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2015-3217"
},
{
"cve": "CVE-2015-3238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3238"
}
],
"notes": [
{
"category": "general",
"text": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3238",
"url": "https://www.suse.com/security/cve/CVE-2015-3238"
},
{
"category": "external",
"summary": "SUSE Bug 1123794 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/1123794"
},
{
"category": "external",
"summary": "SUSE Bug 934920 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/934920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-3238"
},
{
"cve": "CVE-2015-3622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3622"
}
],
"notes": [
{
"category": "general",
"text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3622",
"url": "https://www.suse.com/security/cve/CVE-2015-3622"
},
{
"category": "external",
"summary": "SUSE Bug 929414 for CVE-2015-3622",
"url": "https://bugzilla.suse.com/929414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-3622"
},
{
"cve": "CVE-2015-5073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5073"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5073",
"url": "https://www.suse.com/security/cve/CVE-2015-5073"
},
{
"category": "external",
"summary": "SUSE Bug 936227 for CVE-2015-5073",
"url": "https://bugzilla.suse.com/936227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-5073"
},
{
"cve": "CVE-2015-5218",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5218"
}
],
"notes": [
{
"category": "general",
"text": "Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5218",
"url": "https://www.suse.com/security/cve/CVE-2015-5218"
},
{
"category": "external",
"summary": "SUSE Bug 949754 for CVE-2015-5218",
"url": "https://bugzilla.suse.com/949754"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2015-5218"
},
{
"cve": "CVE-2015-5276",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5276"
}
],
"notes": [
{
"category": "general",
"text": "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5276",
"url": "https://www.suse.com/security/cve/CVE-2015-5276"
},
{
"category": "external",
"summary": "SUSE Bug 945842 for CVE-2015-5276",
"url": "https://bugzilla.suse.com/945842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-5276"
},
{
"cve": "CVE-2015-7511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7511"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7511",
"url": "https://www.suse.com/security/cve/CVE-2015-7511"
},
{
"category": "external",
"summary": "SUSE Bug 965902 for CVE-2015-7511",
"url": "https://bugzilla.suse.com/965902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-7511"
},
{
"cve": "CVE-2015-8380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8380"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8380",
"url": "https://www.suse.com/security/cve/CVE-2015-8380"
},
{
"category": "external",
"summary": "SUSE Bug 957566 for CVE-2015-8380",
"url": "https://bugzilla.suse.com/957566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2015-8380"
},
{
"cve": "CVE-2015-8381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8381"
}
],
"notes": [
{
"category": "general",
"text": "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Rk\u0027Rf)|s(?\u0027R\u0027))))/ and /(?J:(?|(:(?|(?\u0027R\u0027)(\\z(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Ak\u0027Rf)|s(?\u0027R\u0027)))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8381",
"url": "https://www.suse.com/security/cve/CVE-2015-8381"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8381"
},
{
"cve": "CVE-2015-8382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8382"
}
],
"notes": [
{
"category": "general",
"text": "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8382",
"url": "https://www.suse.com/security/cve/CVE-2015-8382"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8382",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8382",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8382"
},
{
"cve": "CVE-2015-8383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8383"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8383",
"url": "https://www.suse.com/security/cve/CVE-2015-8383"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8383",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8383",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8383"
},
{
"cve": "CVE-2015-8384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8384"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?J)(?\u0027d\u0027(?\u0027d\u0027\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8384",
"url": "https://www.suse.com/security/cve/CVE-2015-8384"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8384"
},
{
"cve": "CVE-2015-8385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8385"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?|(\\k\u0027Pm\u0027)|(?\u0027Pm\u0027))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8385",
"url": "https://www.suse.com/security/cve/CVE-2015-8385"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8385",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8385",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8385"
},
{
"cve": "CVE-2015-8386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8386"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8386",
"url": "https://www.suse.com/security/cve/CVE-2015-8386"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8386",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8386",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8386"
},
{
"cve": "CVE-2015-8387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8387"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8387",
"url": "https://www.suse.com/security/cve/CVE-2015-8387"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8387",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8387",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8387"
},
{
"cve": "CVE-2015-8388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8388"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?=di(?\u003c=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8388",
"url": "https://www.suse.com/security/cve/CVE-2015-8388"
},
{
"category": "external",
"summary": "SUSE Bug 936227 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/936227"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8388"
},
{
"cve": "CVE-2015-8389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8389"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8389",
"url": "https://www.suse.com/security/cve/CVE-2015-8389"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8389",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8389",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8389"
},
{
"cve": "CVE-2015-8390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8390"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8390",
"url": "https://www.suse.com/security/cve/CVE-2015-8390"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8390",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8390",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8390"
},
{
"cve": "CVE-2015-8391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8391"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8391",
"url": "https://www.suse.com/security/cve/CVE-2015-8391"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8391",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8391",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8391"
},
{
"cve": "CVE-2015-8392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8392"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8392",
"url": "https://www.suse.com/security/cve/CVE-2015-8392"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8392"
},
{
"cve": "CVE-2015-8393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8393"
}
],
"notes": [
{
"category": "general",
"text": "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8393",
"url": "https://www.suse.com/security/cve/CVE-2015-8393"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8393",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8393",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8393"
},
{
"cve": "CVE-2015-8394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8394"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the (?(\u003cdigits\u003e) and (?(R\u003cdigits\u003e) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8394",
"url": "https://www.suse.com/security/cve/CVE-2015-8394"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8394",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8394",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8394"
},
{
"cve": "CVE-2015-8395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8395"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8395",
"url": "https://www.suse.com/security/cve/CVE-2015-8395"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2015-8395"
},
{
"cve": "CVE-2015-8806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8806"
}
],
"notes": [
{
"category": "general",
"text": "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"\u003c!DOCTYPE html\" substring in a crafted HTML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8806",
"url": "https://www.suse.com/security/cve/CVE-2015-8806"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/963963"
},
{
"category": "external",
"summary": "SUSE Bug 965283 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/965283"
},
{
"category": "external",
"summary": "SUSE Bug 981114 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/981114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8806"
},
{
"cve": "CVE-2015-8842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8842"
}
],
"notes": [
{
"category": "general",
"text": "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8842",
"url": "https://www.suse.com/security/cve/CVE-2015-8842"
},
{
"category": "external",
"summary": "SUSE Bug 972612 for CVE-2015-8842",
"url": "https://bugzilla.suse.com/972612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8842"
},
{
"cve": "CVE-2015-8853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8853"
}
],
"notes": [
{
"category": "general",
"text": "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8853",
"url": "https://www.suse.com/security/cve/CVE-2015-8853"
},
{
"category": "external",
"summary": "SUSE Bug 976584 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/976584"
},
{
"category": "external",
"summary": "SUSE Bug 997948 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/997948"
},
{
"category": "external",
"summary": "SUSE Bug 997950 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/997950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8853"
},
{
"cve": "CVE-2015-8948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8948"
}
],
"notes": [
{
"category": "general",
"text": "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8948",
"url": "https://www.suse.com/security/cve/CVE-2015-8948"
},
{
"category": "external",
"summary": "SUSE Bug 1014473 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1014473"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 1190777 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1190777"
},
{
"category": "external",
"summary": "SUSE Bug 990189 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/990189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2015-8948"
},
{
"cve": "CVE-2016-0634",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0634"
}
],
"notes": [
{
"category": "general",
"text": "The expansion of \u0027\\h\u0027 in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in \u0027hostname\u0027 of a machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0634",
"url": "https://www.suse.com/security/cve/CVE-2016-0634"
},
{
"category": "external",
"summary": "SUSE Bug 1000396 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1000396"
},
{
"category": "external",
"summary": "SUSE Bug 1001299 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1001299"
},
{
"category": "external",
"summary": "SUSE Bug 1159416 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1159416"
},
{
"category": "external",
"summary": "SUSE Bug 1188388 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1188388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-0634"
},
{
"cve": "CVE-2016-0718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0718"
}
],
"notes": [
{
"category": "general",
"text": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0718",
"url": "https://www.suse.com/security/cve/CVE-2016-0718"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 991809 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/991809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-0718"
},
{
"cve": "CVE-2016-0787",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0787"
}
],
"notes": [
{
"category": "general",
"text": "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0787",
"url": "https://www.suse.com/security/cve/CVE-2016-0787"
},
{
"category": "external",
"summary": "SUSE Bug 1149968 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/1149968"
},
{
"category": "external",
"summary": "SUSE Bug 967026 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/967026"
},
{
"category": "external",
"summary": "SUSE Bug 968174 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/968174"
},
{
"category": "external",
"summary": "SUSE Bug 974691 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/974691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-0787"
},
{
"cve": "CVE-2016-1234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1234"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1234",
"url": "https://www.suse.com/security/cve/CVE-2016-1234"
},
{
"category": "external",
"summary": "SUSE Bug 1020940 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/1020940"
},
{
"category": "external",
"summary": "SUSE Bug 969727 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/969727"
},
{
"category": "external",
"summary": "SUSE Bug 988770 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/988770"
},
{
"category": "external",
"summary": "SUSE Bug 988782 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/988782"
},
{
"category": "external",
"summary": "SUSE Bug 989127 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/989127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1234"
},
{
"cve": "CVE-2016-1238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1238"
}
],
"notes": [
{
"category": "general",
"text": "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1238",
"url": "https://www.suse.com/security/cve/CVE-2016-1238"
},
{
"category": "external",
"summary": "SUSE Bug 1108749 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1108749"
},
{
"category": "external",
"summary": "SUSE Bug 1123389 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1123389"
},
{
"category": "external",
"summary": "SUSE Bug 987887 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/987887"
},
{
"category": "external",
"summary": "SUSE Bug 988311 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/988311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1238"
},
{
"cve": "CVE-2016-1283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1283"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?\u0027R\u0027(?\u0027R\u0027\u003c((?\u0027RR\u0027(?\u0027R\u0027\\){97)?J)?J)(?\u0027R\u0027(?\u0027R\u0027\\){99|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027R\u0027R)(H\u0027R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1283",
"url": "https://www.suse.com/security/cve/CVE-2016-1283"
},
{
"category": "external",
"summary": "SUSE Bug 960837 for CVE-2016-1283",
"url": "https://bugzilla.suse.com/960837"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2016-1283"
},
{
"cve": "CVE-2016-1762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1762"
}
],
"notes": [
{
"category": "general",
"text": "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1762",
"url": "https://www.suse.com/security/cve/CVE-2016-1762"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1762",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981040 for CVE-2016-1762",
"url": "https://bugzilla.suse.com/981040"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1762"
},
{
"cve": "CVE-2016-1833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1833"
}
],
"notes": [
{
"category": "general",
"text": "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1833",
"url": "https://www.suse.com/security/cve/CVE-2016-1833"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1833",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981108 for CVE-2016-1833",
"url": "https://bugzilla.suse.com/981108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1833"
},
{
"cve": "CVE-2016-1834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1834"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1834",
"url": "https://www.suse.com/security/cve/CVE-2016-1834"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1834",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981041 for CVE-2016-1834",
"url": "https://bugzilla.suse.com/981041"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1834"
},
{
"cve": "CVE-2016-1835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1835"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1835",
"url": "https://www.suse.com/security/cve/CVE-2016-1835"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1835",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981109 for CVE-2016-1835",
"url": "https://bugzilla.suse.com/981109"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1835"
},
{
"cve": "CVE-2016-1837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1837"
}
],
"notes": [
{
"category": "general",
"text": "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1837",
"url": "https://www.suse.com/security/cve/CVE-2016-1837"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1837",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981111 for CVE-2016-1837",
"url": "https://bugzilla.suse.com/981111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1837"
},
{
"cve": "CVE-2016-1838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1838"
}
],
"notes": [
{
"category": "general",
"text": "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1838",
"url": "https://www.suse.com/security/cve/CVE-2016-1838"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1838",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981112 for CVE-2016-1838",
"url": "https://bugzilla.suse.com/981112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1838"
},
{
"cve": "CVE-2016-1839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1839"
}
],
"notes": [
{
"category": "general",
"text": "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1839",
"url": "https://www.suse.com/security/cve/CVE-2016-1839"
},
{
"category": "external",
"summary": "SUSE Bug 1039069 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1039069"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/963963"
},
{
"category": "external",
"summary": "SUSE Bug 981114 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/981114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1839"
},
{
"cve": "CVE-2016-1840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1840"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1840",
"url": "https://www.suse.com/security/cve/CVE-2016-1840"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1840",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981115 for CVE-2016-1840",
"url": "https://bugzilla.suse.com/981115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-1840"
},
{
"cve": "CVE-2016-2037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2037"
}
],
"notes": [
{
"category": "general",
"text": "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2037",
"url": "https://www.suse.com/security/cve/CVE-2016-2037"
},
{
"category": "external",
"summary": "SUSE Bug 1028410 for CVE-2016-2037",
"url": "https://bugzilla.suse.com/1028410"
},
{
"category": "external",
"summary": "SUSE Bug 963448 for CVE-2016-2037",
"url": "https://bugzilla.suse.com/963448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2037"
},
{
"cve": "CVE-2016-2073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2073"
}
],
"notes": [
{
"category": "general",
"text": "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2073",
"url": "https://www.suse.com/security/cve/CVE-2016-2073"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2016-2073",
"url": "https://bugzilla.suse.com/963963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2073"
},
{
"cve": "CVE-2016-2105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2105"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2105",
"url": "https://www.suse.com/security/cve/CVE-2016-2105"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977614 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/977614"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 989902 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/989902"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/990369"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-2105"
},
{
"cve": "CVE-2016-2106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2106"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2106",
"url": "https://www.suse.com/security/cve/CVE-2016-2106"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977615 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/977615"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 979279 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/979279"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/990369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-2106"
},
{
"cve": "CVE-2016-2107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2107"
}
],
"notes": [
{
"category": "general",
"text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2107",
"url": "https://www.suse.com/security/cve/CVE-2016-2107"
},
{
"category": "external",
"summary": "SUSE Bug 976942 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/976942"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977616 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/977616"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/990369"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-2107"
},
{
"cve": "CVE-2016-2108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2108"
}
],
"notes": [
{
"category": "general",
"text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2108",
"url": "https://www.suse.com/security/cve/CVE-2016-2108"
},
{
"category": "external",
"summary": "SUSE Bug 1001502 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1001502"
},
{
"category": "external",
"summary": "SUSE Bug 1004499 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1004499"
},
{
"category": "external",
"summary": "SUSE Bug 1005878 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1005878"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1148697"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977617 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/977617"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 989345 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/989345"
},
{
"category": "external",
"summary": "SUSE Bug 996067 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/996067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-2108"
},
{
"cve": "CVE-2016-2109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2109"
}
],
"notes": [
{
"category": "general",
"text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2109",
"url": "https://www.suse.com/security/cve/CVE-2016-2109"
},
{
"category": "external",
"summary": "SUSE Bug 1015243 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/1015243"
},
{
"category": "external",
"summary": "SUSE Bug 976942 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/976942"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/990369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2109"
},
{
"cve": "CVE-2016-2177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2177"
}
],
"notes": [
{
"category": "general",
"text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2177",
"url": "https://www.suse.com/security/cve/CVE-2016-2177"
},
{
"category": "external",
"summary": "SUSE Bug 982575 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/982575"
},
{
"category": "external",
"summary": "SUSE Bug 999075 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/999075"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-2177"
},
{
"cve": "CVE-2016-2178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2178"
}
],
"notes": [
{
"category": "general",
"text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2178",
"url": "https://www.suse.com/security/cve/CVE-2016-2178"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 983249 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983249"
},
{
"category": "external",
"summary": "SUSE Bug 983519 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983519"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2178"
},
{
"cve": "CVE-2016-2179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2179"
}
],
"notes": [
{
"category": "general",
"text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2179",
"url": "https://www.suse.com/security/cve/CVE-2016-2179"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2179"
},
{
"cve": "CVE-2016-2180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2180"
}
],
"notes": [
{
"category": "general",
"text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2180",
"url": "https://www.suse.com/security/cve/CVE-2016-2180"
},
{
"category": "external",
"summary": "SUSE Bug 1003811 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/1003811"
},
{
"category": "external",
"summary": "SUSE Bug 990419 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/990419"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-2180"
},
{
"cve": "CVE-2016-2181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2181"
}
],
"notes": [
{
"category": "general",
"text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2181",
"url": "https://www.suse.com/security/cve/CVE-2016-2181"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994749 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/994749"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2181"
},
{
"cve": "CVE-2016-2182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2182"
}
],
"notes": [
{
"category": "general",
"text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2182",
"url": "https://www.suse.com/security/cve/CVE-2016-2182"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 993819 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/993819"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995959 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/995959"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2182"
},
{
"cve": "CVE-2016-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2183"
}
],
"notes": [
{
"category": "general",
"text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2183",
"url": "https://www.suse.com/security/cve/CVE-2016-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1001912 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1001912"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1024218"
},
{
"category": "external",
"summary": "SUSE Bug 1027038 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1027038"
},
{
"category": "external",
"summary": "SUSE Bug 1034689 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1034689"
},
{
"category": "external",
"summary": "SUSE Bug 1056614 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1056614"
},
{
"category": "external",
"summary": "SUSE Bug 1171693 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1171693"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995359 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/995359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2183"
},
{
"cve": "CVE-2016-2381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2381"
}
],
"notes": [
{
"category": "general",
"text": "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2381",
"url": "https://www.suse.com/security/cve/CVE-2016-2381"
},
{
"category": "external",
"summary": "SUSE Bug 967082 for CVE-2016-2381",
"url": "https://bugzilla.suse.com/967082"
},
{
"category": "external",
"summary": "SUSE Bug 992991 for CVE-2016-2381",
"url": "https://bugzilla.suse.com/992991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-2381"
},
{
"cve": "CVE-2016-3075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3075"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3075",
"url": "https://www.suse.com/security/cve/CVE-2016-3075"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-3075",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 973164 for CVE-2016-3075",
"url": "https://bugzilla.suse.com/973164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-3075"
},
{
"cve": "CVE-2016-3191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3191"
}
],
"notes": [
{
"category": "general",
"text": "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3191",
"url": "https://www.suse.com/security/cve/CVE-2016-3191"
},
{
"category": "external",
"summary": "SUSE Bug 971741 for CVE-2016-3191",
"url": "https://bugzilla.suse.com/971741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-3191"
},
{
"cve": "CVE-2016-3627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3627"
}
],
"notes": [
{
"category": "general",
"text": "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3627",
"url": "https://www.suse.com/security/cve/CVE-2016-3627"
},
{
"category": "external",
"summary": "SUSE Bug 1026099 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1026099"
},
{
"category": "external",
"summary": "SUSE Bug 1026101 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1026101"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 972335 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/972335"
},
{
"category": "external",
"summary": "SUSE Bug 975947 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/975947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-3627"
},
{
"cve": "CVE-2016-3705",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3705"
}
],
"notes": [
{
"category": "general",
"text": "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3705",
"url": "https://www.suse.com/security/cve/CVE-2016-3705"
},
{
"category": "external",
"summary": "SUSE Bug 1017497 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/1017497"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 975947 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/975947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-3705"
},
{
"cve": "CVE-2016-3706",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3706"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3706",
"url": "https://www.suse.com/security/cve/CVE-2016-3706"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 980483 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/980483"
},
{
"category": "external",
"summary": "SUSE Bug 997423 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/997423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-3706"
},
{
"cve": "CVE-2016-4008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4008"
}
],
"notes": [
{
"category": "general",
"text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4008",
"url": "https://www.suse.com/security/cve/CVE-2016-4008"
},
{
"category": "external",
"summary": "SUSE Bug 982779 for CVE-2016-4008",
"url": "https://bugzilla.suse.com/982779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4008"
},
{
"cve": "CVE-2016-4429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4429"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4429",
"url": "https://www.suse.com/security/cve/CVE-2016-4429"
},
{
"category": "external",
"summary": "SUSE Bug 1081556 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/1081556"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 980854 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/980854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-4429"
},
{
"cve": "CVE-2016-4447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4447"
}
],
"notes": [
{
"category": "general",
"text": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4447",
"url": "https://www.suse.com/security/cve/CVE-2016-4447"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4447",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981548 for CVE-2016-4447",
"url": "https://bugzilla.suse.com/981548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4447"
},
{
"cve": "CVE-2016-4448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4448"
}
],
"notes": [
{
"category": "general",
"text": "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4448",
"url": "https://www.suse.com/security/cve/CVE-2016-4448"
},
{
"category": "external",
"summary": "SUSE Bug 1010299 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/1010299"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981549 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/981549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4448"
},
{
"cve": "CVE-2016-4449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4449"
}
],
"notes": [
{
"category": "general",
"text": "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4449",
"url": "https://www.suse.com/security/cve/CVE-2016-4449"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4449",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981550 for CVE-2016-4449",
"url": "https://bugzilla.suse.com/981550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4449"
},
{
"cve": "CVE-2016-4483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4483"
}
],
"notes": [
{
"category": "general",
"text": "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4483",
"url": "https://www.suse.com/security/cve/CVE-2016-4483"
},
{
"category": "external",
"summary": "SUSE Bug 1026101 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/1026101"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 978395 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/978395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-4483"
},
{
"cve": "CVE-2016-4574",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4574"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4574",
"url": "https://www.suse.com/security/cve/CVE-2016-4574"
},
{
"category": "external",
"summary": "SUSE Bug 1135436 for CVE-2016-4574",
"url": "https://bugzilla.suse.com/1135436"
},
{
"category": "external",
"summary": "SUSE Bug 979261 for CVE-2016-4574",
"url": "https://bugzilla.suse.com/979261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-4574"
},
{
"cve": "CVE-2016-4579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4579"
}
],
"notes": [
{
"category": "general",
"text": "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4579",
"url": "https://www.suse.com/security/cve/CVE-2016-4579"
},
{
"category": "external",
"summary": "SUSE Bug 1135436 for CVE-2016-4579",
"url": "https://bugzilla.suse.com/1135436"
},
{
"category": "external",
"summary": "SUSE Bug 979906 for CVE-2016-4579",
"url": "https://bugzilla.suse.com/979906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4579"
},
{
"cve": "CVE-2016-4658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4658"
}
],
"notes": [
{
"category": "general",
"text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4658",
"url": "https://www.suse.com/security/cve/CVE-2016-4658"
},
{
"category": "external",
"summary": "SUSE Bug 1005544 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1005544"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1078813 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1078813"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2016-5011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5011"
}
],
"notes": [
{
"category": "general",
"text": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5011",
"url": "https://www.suse.com/security/cve/CVE-2016-5011"
},
{
"category": "external",
"summary": "SUSE Bug 988361 for CVE-2016-5011",
"url": "https://bugzilla.suse.com/988361"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-5011"
},
{
"cve": "CVE-2016-5300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5300"
}
],
"notes": [
{
"category": "general",
"text": "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5300",
"url": "https://www.suse.com/security/cve/CVE-2016-5300"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2016-5300",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2016-5300"
},
{
"cve": "CVE-2016-5419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5419"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5419",
"url": "https://www.suse.com/security/cve/CVE-2016-5419"
},
{
"category": "external",
"summary": "SUSE Bug 1033413 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/1033413"
},
{
"category": "external",
"summary": "SUSE Bug 1033442 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/1033442"
},
{
"category": "external",
"summary": "SUSE Bug 991389 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/991389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-5419"
},
{
"cve": "CVE-2016-5420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5420"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5420",
"url": "https://www.suse.com/security/cve/CVE-2016-5420"
},
{
"category": "external",
"summary": "SUSE Bug 991390 for CVE-2016-5420",
"url": "https://bugzilla.suse.com/991390"
},
{
"category": "external",
"summary": "SUSE Bug 997420 for CVE-2016-5420",
"url": "https://bugzilla.suse.com/997420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-5420"
},
{
"cve": "CVE-2016-5421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5421"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5421",
"url": "https://www.suse.com/security/cve/CVE-2016-5421"
},
{
"category": "external",
"summary": "SUSE Bug 991391 for CVE-2016-5421",
"url": "https://bugzilla.suse.com/991391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-5421"
},
{
"cve": "CVE-2016-6185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6185"
}
],
"notes": [
{
"category": "general",
"text": "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6185",
"url": "https://www.suse.com/security/cve/CVE-2016-6185"
},
{
"category": "external",
"summary": "SUSE Bug 988311 for CVE-2016-6185",
"url": "https://bugzilla.suse.com/988311"
},
{
"category": "external",
"summary": "SUSE Bug 999993 for CVE-2016-6185",
"url": "https://bugzilla.suse.com/999993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6185"
},
{
"cve": "CVE-2016-6261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6261"
}
],
"notes": [
{
"category": "general",
"text": "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6261",
"url": "https://www.suse.com/security/cve/CVE-2016-6261"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 990190 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/990190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-6261"
},
{
"cve": "CVE-2016-6262",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6262"
}
],
"notes": [
{
"category": "general",
"text": "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6262",
"url": "https://www.suse.com/security/cve/CVE-2016-6262"
},
{
"category": "external",
"summary": "SUSE Bug 1014473 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1014473"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 1190777 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1190777"
},
{
"category": "external",
"summary": "SUSE Bug 990189 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/990189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6262"
},
{
"cve": "CVE-2016-6263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6263"
}
],
"notes": [
{
"category": "general",
"text": "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6263",
"url": "https://www.suse.com/security/cve/CVE-2016-6263"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2016-6263",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 990191 for CVE-2016-6263",
"url": "https://bugzilla.suse.com/990191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-6263"
},
{
"cve": "CVE-2016-6302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6302"
}
],
"notes": [
{
"category": "general",
"text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6302",
"url": "https://www.suse.com/security/cve/CVE-2016-6302"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995324 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/995324"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6302"
},
{
"cve": "CVE-2016-6303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6303"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6303",
"url": "https://www.suse.com/security/cve/CVE-2016-6303"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995377 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/995377"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6303"
},
{
"cve": "CVE-2016-6304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6304"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6304",
"url": "https://www.suse.com/security/cve/CVE-2016-6304"
},
{
"category": "external",
"summary": "SUSE Bug 1001706 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1001706"
},
{
"category": "external",
"summary": "SUSE Bug 1003811 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1003811"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 1005579 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1005579"
},
{
"category": "external",
"summary": "SUSE Bug 1021375 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1021375"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999666 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6304"
},
{
"cve": "CVE-2016-6306",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6306"
}
],
"notes": [
{
"category": "general",
"text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6306",
"url": "https://www.suse.com/security/cve/CVE-2016-6306"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999668 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999668"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-6306"
},
{
"cve": "CVE-2016-6313",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6313"
}
],
"notes": [
{
"category": "general",
"text": "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6313",
"url": "https://www.suse.com/security/cve/CVE-2016-6313"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/1123792"
},
{
"category": "external",
"summary": "SUSE Bug 994157 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/994157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6313"
},
{
"cve": "CVE-2016-6318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6318"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6318",
"url": "https://www.suse.com/security/cve/CVE-2016-6318"
},
{
"category": "external",
"summary": "SUSE Bug 1123113 for CVE-2016-6318",
"url": "https://bugzilla.suse.com/1123113"
},
{
"category": "external",
"summary": "SUSE Bug 992966 for CVE-2016-6318",
"url": "https://bugzilla.suse.com/992966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-6318"
},
{
"cve": "CVE-2016-7141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7141"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7141",
"url": "https://www.suse.com/security/cve/CVE-2016-7141"
},
{
"category": "external",
"summary": "SUSE Bug 991390 for CVE-2016-7141",
"url": "https://bugzilla.suse.com/991390"
},
{
"category": "external",
"summary": "SUSE Bug 997420 for CVE-2016-7141",
"url": "https://bugzilla.suse.com/997420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-7141"
},
{
"cve": "CVE-2016-7167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7167"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7167",
"url": "https://www.suse.com/security/cve/CVE-2016-7167"
},
{
"category": "external",
"summary": "SUSE Bug 998760 for CVE-2016-7167",
"url": "https://bugzilla.suse.com/998760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-7167"
},
{
"cve": "CVE-2016-7543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7543"
}
],
"notes": [
{
"category": "general",
"text": "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7543",
"url": "https://www.suse.com/security/cve/CVE-2016-7543"
},
{
"category": "external",
"summary": "SUSE Bug 1001299 for CVE-2016-7543",
"url": "https://bugzilla.suse.com/1001299"
},
{
"category": "external",
"summary": "SUSE Bug 1159416 for CVE-2016-7543",
"url": "https://bugzilla.suse.com/1159416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-7543"
},
{
"cve": "CVE-2016-7796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7796"
}
],
"notes": [
{
"category": "general",
"text": "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7796",
"url": "https://www.suse.com/security/cve/CVE-2016-7796"
},
{
"category": "external",
"summary": "SUSE Bug 1001765 for CVE-2016-7796",
"url": "https://bugzilla.suse.com/1001765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-7796"
},
{
"cve": "CVE-2016-8615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8615"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8615",
"url": "https://www.suse.com/security/cve/CVE-2016-8615"
},
{
"category": "external",
"summary": "SUSE Bug 1005633 for CVE-2016-8615",
"url": "https://bugzilla.suse.com/1005633"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8615"
},
{
"cve": "CVE-2016-8616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8616"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8616",
"url": "https://www.suse.com/security/cve/CVE-2016-8616"
},
{
"category": "external",
"summary": "SUSE Bug 1005634 for CVE-2016-8616",
"url": "https://bugzilla.suse.com/1005634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-8616"
},
{
"cve": "CVE-2016-8617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8617"
}
],
"notes": [
{
"category": "general",
"text": "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8617",
"url": "https://www.suse.com/security/cve/CVE-2016-8617"
},
{
"category": "external",
"summary": "SUSE Bug 1005635 for CVE-2016-8617",
"url": "https://bugzilla.suse.com/1005635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-8617"
},
{
"cve": "CVE-2016-8618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8618"
}
],
"notes": [
{
"category": "general",
"text": "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8618",
"url": "https://www.suse.com/security/cve/CVE-2016-8618"
},
{
"category": "external",
"summary": "SUSE Bug 1005637 for CVE-2016-8618",
"url": "https://bugzilla.suse.com/1005637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8618"
},
{
"cve": "CVE-2016-8619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8619"
}
],
"notes": [
{
"category": "general",
"text": "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8619",
"url": "https://www.suse.com/security/cve/CVE-2016-8619"
},
{
"category": "external",
"summary": "SUSE Bug 1005638 for CVE-2016-8619",
"url": "https://bugzilla.suse.com/1005638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8619"
},
{
"cve": "CVE-2016-8620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8620"
}
],
"notes": [
{
"category": "general",
"text": "The \u0027globbing\u0027 feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8620",
"url": "https://www.suse.com/security/cve/CVE-2016-8620"
},
{
"category": "external",
"summary": "SUSE Bug 1005640 for CVE-2016-8620",
"url": "https://bugzilla.suse.com/1005640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-8620"
},
{
"cve": "CVE-2016-8621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8621"
}
],
"notes": [
{
"category": "general",
"text": "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8621",
"url": "https://www.suse.com/security/cve/CVE-2016-8621"
},
{
"category": "external",
"summary": "SUSE Bug 1005642 for CVE-2016-8621",
"url": "https://bugzilla.suse.com/1005642"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8621"
},
{
"cve": "CVE-2016-8622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8622"
}
],
"notes": [
{
"category": "general",
"text": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8622",
"url": "https://www.suse.com/security/cve/CVE-2016-8622"
},
{
"category": "external",
"summary": "SUSE Bug 1005643 for CVE-2016-8622",
"url": "https://bugzilla.suse.com/1005643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8622"
},
{
"cve": "CVE-2016-8623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8623"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8623",
"url": "https://www.suse.com/security/cve/CVE-2016-8623"
},
{
"category": "external",
"summary": "SUSE Bug 1005645 for CVE-2016-8623",
"url": "https://bugzilla.suse.com/1005645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-8623"
},
{
"cve": "CVE-2016-8624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8624"
}
],
"notes": [
{
"category": "general",
"text": "curl before version 7.51.0 doesn\u0027t parse the authority component of the URL correctly when the host name part ends with a \u0027#\u0027 character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8624",
"url": "https://www.suse.com/security/cve/CVE-2016-8624"
},
{
"category": "external",
"summary": "SUSE Bug 1005646 for CVE-2016-8624",
"url": "https://bugzilla.suse.com/1005646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-8624"
},
{
"cve": "CVE-2016-9063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9063"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox \u003c 50.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9063",
"url": "https://www.suse.com/security/cve/CVE-2016-9063"
},
{
"category": "external",
"summary": "SUSE Bug 1009026 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1009026"
},
{
"category": "external",
"summary": "SUSE Bug 1010424 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1010424"
},
{
"category": "external",
"summary": "SUSE Bug 1047240 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1047240"
},
{
"category": "external",
"summary": "SUSE Bug 1123115 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1123115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2016-9063"
},
{
"cve": "CVE-2016-9318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9318"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9318",
"url": "https://www.suse.com/security/cve/CVE-2016-9318"
},
{
"category": "external",
"summary": "SUSE Bug 1010675 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1010675"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1019074 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "external",
"summary": "SUSE Bug 1118959 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1118959"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 1126613 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1126613"
},
{
"category": "external",
"summary": "SUSE Bug 1148896 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1148896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-9318"
},
{
"cve": "CVE-2016-9586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9586"
}
],
"notes": [
{
"category": "general",
"text": "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl\u0027s implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9586",
"url": "https://www.suse.com/security/cve/CVE-2016-9586"
},
{
"category": "external",
"summary": "SUSE Bug 1015332 for CVE-2016-9586",
"url": "https://bugzilla.suse.com/1015332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-9586"
},
{
"cve": "CVE-2016-9597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9597"
}
],
"notes": [
{
"category": "general",
"text": "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9597",
"url": "https://www.suse.com/security/cve/CVE-2016-9597"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1017497 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1017497"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-9597"
},
{
"cve": "CVE-2016-9840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9840"
}
],
"notes": [
{
"category": "general",
"text": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9840",
"url": "https://www.suse.com/security/cve/CVE-2016-9840"
},
{
"category": "external",
"summary": "SUSE Bug 1003579 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1003579"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1023215 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1023215"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2016-9840"
},
{
"cve": "CVE-2016-9841",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9841"
}
],
"notes": [
{
"category": "general",
"text": "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9841",
"url": "https://www.suse.com/security/cve/CVE-2016-9841"
},
{
"category": "external",
"summary": "SUSE Bug 1003579 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1003579"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1064070 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1064070"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1070162"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1127473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "critical"
}
],
"title": "CVE-2016-9841"
},
{
"cve": "CVE-2016-9842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9842"
}
],
"notes": [
{
"category": "general",
"text": "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9842",
"url": "https://www.suse.com/security/cve/CVE-2016-9842"
},
{
"category": "external",
"summary": "SUSE Bug 1003580 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1003580"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1023215 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1023215"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2016-9842"
},
{
"cve": "CVE-2016-9843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9843"
}
],
"notes": [
{
"category": "general",
"text": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9843",
"url": "https://www.suse.com/security/cve/CVE-2016-9843"
},
{
"category": "external",
"summary": "SUSE Bug 1003580 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1003580"
},
{
"category": "external",
"summary": "SUSE Bug 1013882 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1013882"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1116686"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2016-9843"
},
{
"cve": "CVE-2017-1000100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000100"
}
],
"notes": [
{
"category": "general",
"text": "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn\u0027t restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl\u0027s redirect protocols with --proto-redir and libcurl\u0027s with CURLOPT_REDIR_PROTOCOLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000100",
"url": "https://www.suse.com/security/cve/CVE-2017-1000100"
},
{
"category": "external",
"summary": "SUSE Bug 1051644 for CVE-2017-1000100",
"url": "https://bugzilla.suse.com/1051644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-1000100"
},
{
"cve": "CVE-2017-1000101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000101"
}
],
"notes": [
{
"category": "general",
"text": "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000101",
"url": "https://www.suse.com/security/cve/CVE-2017-1000101"
},
{
"category": "external",
"summary": "SUSE Bug 1051643 for CVE-2017-1000101",
"url": "https://bugzilla.suse.com/1051643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-1000101"
},
{
"cve": "CVE-2017-1000366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000366"
}
],
"notes": [
{
"category": "general",
"text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000366",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "SUSE Bug 1037551 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1037551"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1063847 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1063847"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1071319"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2017-1000366"
},
{
"cve": "CVE-2017-10684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10684"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10684",
"url": "https://www.suse.com/security/cve/CVE-2017-10684"
},
{
"category": "external",
"summary": "SUSE Bug 1046858 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1046858"
},
{
"category": "external",
"summary": "SUSE Bug 1115932 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1115932"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-10684"
},
{
"cve": "CVE-2017-10685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10685"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10685",
"url": "https://www.suse.com/security/cve/CVE-2017-10685"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1115932 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1115932"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-10685"
},
{
"cve": "CVE-2017-11112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11112"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11112",
"url": "https://www.suse.com/security/cve/CVE-2017-11112"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1047964 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1047964"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-11112"
},
{
"cve": "CVE-2017-11113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11113"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11113",
"url": "https://www.suse.com/security/cve/CVE-2017-11113"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1047965 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1047965"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-11113"
},
{
"cve": "CVE-2017-2616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2616"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2616",
"url": "https://www.suse.com/security/cve/CVE-2017-2616"
},
{
"category": "external",
"summary": "SUSE Bug 1023041 for CVE-2017-2616",
"url": "https://bugzilla.suse.com/1023041"
},
{
"category": "external",
"summary": "SUSE Bug 1123789 for CVE-2017-2616",
"url": "https://bugzilla.suse.com/1123789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2017-2616"
},
{
"cve": "CVE-2017-6507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6507"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle \u0027restart\u0027 operations removing AppArmor profiles that aren\u0027t found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what\u0027s done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6507",
"url": "https://www.suse.com/security/cve/CVE-2017-6507"
},
{
"category": "external",
"summary": "SUSE Bug 1029696 for CVE-2017-6507",
"url": "https://bugzilla.suse.com/1029696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-6507"
},
{
"cve": "CVE-2017-7407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7407"
}
],
"notes": [
{
"category": "general",
"text": "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a \u0027%\u0027 character, which leads to a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7407",
"url": "https://www.suse.com/security/cve/CVE-2017-7407"
},
{
"category": "external",
"summary": "SUSE Bug 1032309 for CVE-2017-7407",
"url": "https://bugzilla.suse.com/1032309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2017-7407"
},
{
"cve": "CVE-2017-7526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7526"
}
],
"notes": [
{
"category": "general",
"text": "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7526",
"url": "https://www.suse.com/security/cve/CVE-2017-7526"
},
{
"category": "external",
"summary": "SUSE Bug 1046607 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1046607"
},
{
"category": "external",
"summary": "SUSE Bug 1047462 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1047462"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1123792"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "low"
}
],
"title": "CVE-2017-7526"
},
{
"cve": "CVE-2017-9047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9047"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9047",
"url": "https://www.suse.com/security/cve/CVE-2017-9047"
},
{
"category": "external",
"summary": "SUSE Bug 1039063 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039063"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039657 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039657"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-9047"
},
{
"cve": "CVE-2017-9048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9048"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9048",
"url": "https://www.suse.com/security/cve/CVE-2017-9048"
},
{
"category": "external",
"summary": "SUSE Bug 1039064 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039064"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039658 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-9048"
},
{
"cve": "CVE-2017-9049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9049"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9049",
"url": "https://www.suse.com/security/cve/CVE-2017-9049"
},
{
"category": "external",
"summary": "SUSE Bug 1039063 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039063"
},
{
"category": "external",
"summary": "SUSE Bug 1039064 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039064"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039659 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039659"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2017-9049"
},
{
"cve": "CVE-2017-9050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9050"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9050",
"url": "https://www.suse.com/security/cve/CVE-2017-9050"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039069 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039069"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "moderate"
}
],
"title": "CVE-2017-9050"
},
{
"cve": "CVE-2017-9233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9233"
}
],
"notes": [
{
"category": "general",
"text": "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9233",
"url": "https://www.suse.com/security/cve/CVE-2017-9233"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1047236 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1047236"
},
{
"category": "external",
"summary": "SUSE Bug 1073350 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1073350"
},
{
"category": "external",
"summary": "SUSE Bug 1123115 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1123115"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:24Z",
"details": "important"
}
],
"title": "CVE-2017-9233"
}
]
}
SUSE-SU-2017:2700-1
Vulnerability from csaf_suse - Published: 2017-10-10 19:37 - Updated: 2017-10-10 19:37Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for SLES 12-SP1 Docker image",
"title": "Title of the patch"
},
{
"category": "description",
"text": "The SUSE Linux Enterprise Server 12 SP1 container image has been updated to include\nsecurity and stability fixes.\n\nThe following issues related to building of the container images have been fixed:\n\n- Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a\n dependency by the Build Service solver. (bsc#1056193)\n- Do not install recommended packages when building container images. (bsc#975726)\n\nA number of security issues that have been already fixed by updates released for\nSUSE Linux Enterprise Server 12 SP1 are now included in the base image. A package/CVE\ncross-reference is available below.\n\npam:\n\n- CVE-2015-3238\n\nlibtasn1:\n\n- CVE-2015-3622\n- CVE-2016-4008\n\nexpat:\n\nexpat:\n\n- CVE-2012-6702\n- CVE-2015-1283\n- CVE-2016-0718\n- CVE-2016-5300\n- CVE-2016-9063\n- CVE-2017-9233\n\nlibidn:\n\n- CVE-2015-2059\n- CVE-2015-8948\n- CVE-2016-6261\n- CVE-2016-6262\n- CVE-2016-6263\n\n\nzlib:\n\n- CVE-2016-9840\n- CVE-2016-9841\n- CVE-2016-9842\n- CVE-2016-9843\n\ncurl:\n\n- CVE-2016-5419\n- CVE-2016-5420\n- CVE-2016-5421\n- CVE-2016-7141\n- CVE-2016-7167\n- CVE-2016-8615\n- CVE-2016-8616\n- CVE-2016-8617\n- CVE-2016-8618\n- CVE-2016-8619\n- CVE-2016-8620\n- CVE-2016-8621\n- CVE-2016-8622\n- CVE-2016-8623\n- CVE-2016-8624\n- CVE-2016-9586\n- CVE-2017-1000100\n- CVE-2017-1000101\n- CVE-2017-7407\n\nopenssl:\n\n- CVE-2016-2105\n- CVE-2016-2106\n- CVE-2016-2107\n- CVE-2016-2108\n- CVE-2016-2109\n- CVE-2016-2177\n- CVE-2016-2178\n- CVE-2016-2179\n- CVE-2016-2180\n- CVE-2016-2181\n- CVE-2016-2182\n- CVE-2016-2183\n- CVE-2016-6302\n- CVE-2016-6303\n- CVE-2016-6304\n- CVE-2016-6306\n- CVE-2016-7056\n- CVE-2016-8610\n- CVE-2017-3731\n\ncracklib:\n\n- CVE-2016-6318\n\npcre:\n\n- CVE-2014-8964\n- CVE-2015-2325\n- CVE-2015-2327\n- CVE-2015-2328\n- CVE-2015-3210\n- CVE-2015-3217\n- CVE-2015-5073\n- CVE-2015-8380\n- CVE-2015-8381\n- CVE-2015-8382\n- CVE-2015-8383\n- CVE-2015-8384\n- CVE-2015-8385\n- CVE-2015-8386\n- CVE-2015-8387\n- CVE-2015-8388\n- CVE-2015-8389\n- CVE-2015-8390\n- CVE-2015-8391\n- CVE-2015-8392\n- CVE-2015-8393\n- CVE-2015-8394\n- CVE-2015-8395\n- CVE-2016-1283\n- CVE-2016-3191\n\nappamor:\n\n- CVE-2017-6507\n\nbash:\n\n- CVE-2014-6277\n- CVE-2014-6278\n- CVE-2016-0634\n- CVE-2016-7543\n\ncpio:\n\n- CVE-2016-2037\n\nglibc:\n\n- CVE-2016-1234\n- CVE-2016-3075\n- CVE-2016-3706\n- CVE-2016-4429\n- CVE-2017-1000366\n\nperl:\n\n- CVE-2015-8853\n- CVE-2016-1238\n- CVE-2016-2381\n- CVE-2016-6185\n\nlibssh2_org:\n\n- CVE-2016-0787\n\nutil-linux:\n\n- CVE-2016-5011\n- CVE-2017-2616\n\nncurses:\n\n- CVE-2017-10684\n- CVE-2017-10685\n- CVE-2017-11112\n- CVE-2017-11113\n\nlibksba:\n\n- CVE-2016-4574\n- CVE-2016-4579\n\nlibxml2:\n\n- CVE-2014-0191\n- CVE-2015-8806\n- CVE-2016-1762\n- CVE-2016-1833\n- CVE-2016-1834\n- CVE-2016-1835\n- CVE-2016-1837\n- CVE-2016-1838\n- CVE-2016-1839\n- CVE-2016-1840\n- CVE-2016-2073\n- CVE-2016-3627\n- CVE-2016-3705\n- CVE-2016-4447\n- CVE-2016-4448\n- CVE-2016-4449\n- CVE-2016-4483\n- CVE-2016-4658\n- CVE-2016-9318\n- CVE-2016-9597\n- CVE-2017-9047\n- CVE-2017-9048\n- CVE-2017-9049\n- CVE-2017-9050\n\nlibgcrypt:\n\n- CVE-2015-7511\n- CVE-2016-6313\n- CVE-2017-7526\n\nupdate-alternatives:\n\n- CVE-2015-0860\n\nsystemd:\n\n- CVE-2014-9770\n- CVE-2015-8842\n- CVE-2016-7796\n\ndbus-1:\n\n- CVE-2014-7824\n- CVE-2015-0245\n\nFinally, the following packages received non-security fixes:\n\n- augeas\n- bzip2\n- ca-certificates-mozilla\n- coreutils\n- cryptsetup\n- cyrus-sasl\n- dirmngr\n- e2fsprogs\n- findutils\n- gpg2\n- insserv-compat\n- kmod\n- libcap\n- libsolv\n- libzypp\n- lua51\n- lvm2\n- netcfg\n- p11-kit\n- permissions\n- procps\n- rpm\n- sed\n- sg3_utils\n- shadow\n- zypper\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Module-Containers-12-2017-1673",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2700-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:2700-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172700-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:2700-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-October/003290.html"
},
{
"category": "self",
"summary": "SUSE Bug 1056193",
"url": "https://bugzilla.suse.com/1056193"
},
{
"category": "self",
"summary": "SUSE Bug 975726",
"url": "https://bugzilla.suse.com/975726"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2012-6702 page",
"url": "https://www.suse.com/security/cve/CVE-2012-6702/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-0191 page",
"url": "https://www.suse.com/security/cve/CVE-2014-0191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6271 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6277 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6278 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7169 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7187 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7824 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7824/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-8964 page",
"url": "https://www.suse.com/security/cve/CVE-2014-8964/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-9770 page",
"url": "https://www.suse.com/security/cve/CVE-2014-9770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0245 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0245/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-0860 page",
"url": "https://www.suse.com/security/cve/CVE-2015-0860/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-1283 page",
"url": "https://www.suse.com/security/cve/CVE-2015-1283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2059 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2325 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2325/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2327 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-2328 page",
"url": "https://www.suse.com/security/cve/CVE-2015-2328/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3210 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3210/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3217 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3238 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-3622 page",
"url": "https://www.suse.com/security/cve/CVE-2015-3622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5073 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-5276 page",
"url": "https://www.suse.com/security/cve/CVE-2015-5276/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-7511 page",
"url": "https://www.suse.com/security/cve/CVE-2015-7511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8380 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8380/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8381 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8382 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8382/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8383 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8383/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8384 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8385 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8385/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8386 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8387 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8387/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8388 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8388/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8389 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8389/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8390 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8390/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8391 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8391/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8392 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8392/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8393 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8393/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8394 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8394/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8395 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8395/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8806 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8842 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8853 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8853/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2015-8948 page",
"url": "https://www.suse.com/security/cve/CVE-2015-8948/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0634 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0634/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0718 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-0787 page",
"url": "https://www.suse.com/security/cve/CVE-2016-0787/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1234 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1234/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1238 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1238/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1283 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1283/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1762 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1833 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1833/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1834 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1835 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1837 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1837/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1838 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1838/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1839 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1839/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-1840 page",
"url": "https://www.suse.com/security/cve/CVE-2016-1840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2037 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2037/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2073 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2105 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2106 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2107 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2108 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2109 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2177 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2178 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2178/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2179 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2179/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2180 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2181 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2181/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2182 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2182/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2183 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2183/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-2381 page",
"url": "https://www.suse.com/security/cve/CVE-2016-2381/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3075 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3191 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3191/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3627 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3705 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3705/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-3706 page",
"url": "https://www.suse.com/security/cve/CVE-2016-3706/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4008 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4429 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4429/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4447 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4448 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4448/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4449 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4449/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4483 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4483/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4574 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4574/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4579 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-4658 page",
"url": "https://www.suse.com/security/cve/CVE-2016-4658/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5011 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5300 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5419 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5419/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5420 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5420/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-5421 page",
"url": "https://www.suse.com/security/cve/CVE-2016-5421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6185 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6185/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6261 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6261/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6262 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6262/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6263 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6263/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6302 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6303 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6303/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6304 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6306 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6313 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6313/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-6318 page",
"url": "https://www.suse.com/security/cve/CVE-2016-6318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7056 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7141 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7167 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7167/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7543 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7543/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-7796 page",
"url": "https://www.suse.com/security/cve/CVE-2016-7796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8610 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8615 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8616 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8617 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8618 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8619 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8620 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8621 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8622 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8623 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-8624 page",
"url": "https://www.suse.com/security/cve/CVE-2016-8624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9063 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9318 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9586 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9586/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9597 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9840 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9840/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9841 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9841/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9842 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9843 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000100 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000101 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-1000366 page",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10684 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10684/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-10685 page",
"url": "https://www.suse.com/security/cve/CVE-2017-10685/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11112 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-11113 page",
"url": "https://www.suse.com/security/cve/CVE-2017-11113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-2616 page",
"url": "https://www.suse.com/security/cve/CVE-2017-2616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-3731 page",
"url": "https://www.suse.com/security/cve/CVE-2017-3731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-6507 page",
"url": "https://www.suse.com/security/cve/CVE-2017-6507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7407 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7407/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7526 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7526/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9047 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9047/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9048 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9049 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9049/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9050 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9050/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9233 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9233/"
}
],
"title": "Security update for SLES 12-SP1 Docker image",
"tracking": {
"current_release_date": "2017-10-10T19:37:36Z",
"generator": {
"date": "2017-10-10T19:37:36Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:2700-1",
"initial_release_date": "2017-10-10T19:37:36Z",
"revision_history": [
{
"date": "2017-10-10T19:37:36Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"product": {
"name": "sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"product_id": "sles12sp1-docker-image-1.0.7-20171002.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "sles12sp1-docker-image-1.0.7-20171002.s390x",
"product": {
"name": "sles12sp1-docker-image-1.0.7-20171002.s390x",
"product_id": "sles12sp1-docker-image-1.0.7-20171002.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "sles12sp1-docker-image-1.0.7-20171002.x86_64",
"product": {
"name": "sles12sp1-docker-image-1.0.7-20171002.x86_64",
"product_id": "sles12sp1-docker-image-1.0.7-20171002.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 12",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:12"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12sp1-docker-image-1.0.7-20171002.ppc64le as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le"
},
"product_reference": "sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12sp1-docker-image-1.0.7-20171002.s390x as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x"
},
"product_reference": "sles12sp1-docker-image-1.0.7-20171002.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sles12sp1-docker-image-1.0.7-20171002.x86_64 as component of SUSE Linux Enterprise Module for Containers 12",
"product_id": "SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
},
"product_reference": "sles12sp1-docker-image-1.0.7-20171002.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2012-6702",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2012-6702"
}
],
"notes": [
{
"category": "general",
"text": "Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2012-6702",
"url": "https://www.suse.com/security/cve/CVE-2012-6702"
},
{
"category": "external",
"summary": "SUSE Bug 983215 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983215"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2012-6702",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2012-6702"
},
{
"cve": "CVE-2014-0191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-0191"
}
],
"notes": [
{
"category": "general",
"text": "The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-0191",
"url": "https://www.suse.com/security/cve/CVE-2014-0191"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 876652 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/876652"
},
{
"category": "external",
"summary": "SUSE Bug 877506 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/877506"
},
{
"category": "external",
"summary": "SUSE Bug 996079 for CVE-2014-0191",
"url": "https://bugzilla.suse.com/996079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-0191"
},
{
"cve": "CVE-2014-6271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6271"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6271",
"url": "https://www.suse.com/security/cve/CVE-2014-6271"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-6271"
},
{
"cve": "CVE-2014-6277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6277"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6277",
"url": "https://www.suse.com/security/cve/CVE-2014-6277"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-6277"
},
{
"cve": "CVE-2014-6278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6278"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6278",
"url": "https://www.suse.com/security/cve/CVE-2014-6278"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/900127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-6278"
},
{
"cve": "CVE-2014-7169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7169"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7169",
"url": "https://www.suse.com/security/cve/CVE-2014-7169"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899039"
},
{
"category": "external",
"summary": "SUSE Bug 899266 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899266"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900454"
},
{
"category": "external",
"summary": "SUSE Bug 902237 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/902237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2014-7169"
},
{
"cve": "CVE-2014-7187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7187"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7187",
"url": "https://www.suse.com/security/cve/CVE-2014-7187"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 898603 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898603"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/899039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2014-7187"
},
{
"cve": "CVE-2014-7824",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7824"
}
],
"notes": [
{
"category": "general",
"text": "D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7824",
"url": "https://www.suse.com/security/cve/CVE-2014-7824"
},
{
"category": "external",
"summary": "SUSE Bug 904017 for CVE-2014-7824",
"url": "https://bugzilla.suse.com/904017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2014-7824"
},
{
"cve": "CVE-2014-8964",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-8964"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-8964",
"url": "https://www.suse.com/security/cve/CVE-2014-8964"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 924960 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/924960"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 936408 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/936408"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2014-8964",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2014-8964"
},
{
"cve": "CVE-2014-9770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-9770"
}
],
"notes": [
{
"category": "general",
"text": "tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-9770",
"url": "https://www.suse.com/security/cve/CVE-2014-9770"
},
{
"category": "external",
"summary": "SUSE Bug 972612 for CVE-2014-9770",
"url": "https://bugzilla.suse.com/972612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2014-9770"
},
{
"cve": "CVE-2015-0245",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0245"
}
],
"notes": [
{
"category": "general",
"text": "D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0245",
"url": "https://www.suse.com/security/cve/CVE-2015-0245"
},
{
"category": "external",
"summary": "SUSE Bug 1003898 for CVE-2015-0245",
"url": "https://bugzilla.suse.com/1003898"
},
{
"category": "external",
"summary": "SUSE Bug 916343 for CVE-2015-0245",
"url": "https://bugzilla.suse.com/916343"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2015-0245"
},
{
"cve": "CVE-2015-0860",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-0860"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the extracthalf function in dpkg-deb/extract.c in the dpkg-deb component in Debian dpkg 1.16.x before 1.16.17 and 1.17.x before 1.17.26 allows remote attackers to execute arbitrary code via the archive magic version number in an \"old-style\" Debian binary package, which triggers a stack-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-0860",
"url": "https://www.suse.com/security/cve/CVE-2015-0860"
},
{
"category": "external",
"summary": "SUSE Bug 957160 for CVE-2015-0860",
"url": "https://bugzilla.suse.com/957160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-0860"
},
{
"cve": "CVE-2015-1283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-1283"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-1283",
"url": "https://www.suse.com/security/cve/CVE-2015-1283"
},
{
"category": "external",
"summary": "SUSE Bug 1034050 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/1034050"
},
{
"category": "external",
"summary": "SUSE Bug 939077 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/939077"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 980391 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/980391"
},
{
"category": "external",
"summary": "SUSE Bug 983985 for CVE-2015-1283",
"url": "https://bugzilla.suse.com/983985"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-1283"
},
{
"cve": "CVE-2015-2059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2059"
}
],
"notes": [
{
"category": "general",
"text": "The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2059",
"url": "https://www.suse.com/security/cve/CVE-2015-2059"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 919214 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/919214"
},
{
"category": "external",
"summary": "SUSE Bug 923241 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/923241"
},
{
"category": "external",
"summary": "SUSE Bug 937096 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/937096"
},
{
"category": "external",
"summary": "SUSE Bug 937097 for CVE-2015-2059",
"url": "https://bugzilla.suse.com/937097"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2015-2059"
},
{
"cve": "CVE-2015-2325",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2325"
}
],
"notes": [
{
"category": "general",
"text": "The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2325",
"url": "https://www.suse.com/security/cve/CVE-2015-2325"
},
{
"category": "external",
"summary": "SUSE Bug 924960 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/924960"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 936408 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/936408"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-2325",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-2325"
},
{
"cve": "CVE-2015-2327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2327"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.36 mishandles the /(((a\\2)|(a*)\\g\u003c-1\u003e))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2327",
"url": "https://www.suse.com/security/cve/CVE-2015-2327"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-2327",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957567 for CVE-2015-2327",
"url": "https://bugzilla.suse.com/957567"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-2327"
},
{
"cve": "CVE-2015-2328",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-2328"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-2328",
"url": "https://www.suse.com/security/cve/CVE-2015-2328"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-2328",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957600 for CVE-2015-2328",
"url": "https://bugzilla.suse.com/957600"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-2328"
},
{
"cve": "CVE-2015-3210",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3210"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P\u003cB\u003ec)(?P\u003cB\u003ea(?P=B)))\u003eWGXCREDITS)/, a different vulnerability than CVE-2015-8384.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3210",
"url": "https://www.suse.com/security/cve/CVE-2015-3210"
},
{
"category": "external",
"summary": "SUSE Bug 933288 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/933288"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-3210",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2015-3210"
},
{
"cve": "CVE-2015-3217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3217"
}
],
"notes": [
{
"category": "general",
"text": "PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\\\.|([^\\\\\\\\W_])?)+)+$/.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3217",
"url": "https://www.suse.com/security/cve/CVE-2015-3217"
},
{
"category": "external",
"summary": "SUSE Bug 933878 for CVE-2015-3217",
"url": "https://bugzilla.suse.com/933878"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-3217",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2015-3217"
},
{
"cve": "CVE-2015-3238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3238"
}
],
"notes": [
{
"category": "general",
"text": "The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3238",
"url": "https://www.suse.com/security/cve/CVE-2015-3238"
},
{
"category": "external",
"summary": "SUSE Bug 1123794 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/1123794"
},
{
"category": "external",
"summary": "SUSE Bug 934920 for CVE-2015-3238",
"url": "https://bugzilla.suse.com/934920"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-3238"
},
{
"cve": "CVE-2015-3622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-3622"
}
],
"notes": [
{
"category": "general",
"text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-3622",
"url": "https://www.suse.com/security/cve/CVE-2015-3622"
},
{
"category": "external",
"summary": "SUSE Bug 929414 for CVE-2015-3622",
"url": "https://bugzilla.suse.com/929414"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2015-3622"
},
{
"cve": "CVE-2015-5073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5073"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5073",
"url": "https://www.suse.com/security/cve/CVE-2015-5073"
},
{
"category": "external",
"summary": "SUSE Bug 936227 for CVE-2015-5073",
"url": "https://bugzilla.suse.com/936227"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-5073"
},
{
"cve": "CVE-2015-5276",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-5276"
}
],
"notes": [
{
"category": "general",
"text": "The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-5276",
"url": "https://www.suse.com/security/cve/CVE-2015-5276"
},
{
"category": "external",
"summary": "SUSE Bug 945842 for CVE-2015-5276",
"url": "https://bugzilla.suse.com/945842"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-5276"
},
{
"cve": "CVE-2015-7511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-7511"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-7511",
"url": "https://www.suse.com/security/cve/CVE-2015-7511"
},
{
"category": "external",
"summary": "SUSE Bug 965902 for CVE-2015-7511",
"url": "https://bugzilla.suse.com/965902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-7511"
},
{
"cve": "CVE-2015-8380",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8380"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \\01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8380",
"url": "https://www.suse.com/security/cve/CVE-2015-8380"
},
{
"category": "external",
"summary": "SUSE Bug 957566 for CVE-2015-8380",
"url": "https://bugzilla.suse.com/957566"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2015-8380"
},
{
"cve": "CVE-2015-8381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8381"
}
],
"notes": [
{
"category": "general",
"text": "The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Rk\u0027Rf)|s(?\u0027R\u0027))))/ and /(?J:(?|(:(?|(?\u0027R\u0027)(\\z(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027Ak\u0027Rf)|s(?\u0027R\u0027)))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8381",
"url": "https://www.suse.com/security/cve/CVE-2015-8381"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8381",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8381"
},
{
"cve": "CVE-2015-8382",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8382"
}
],
"notes": [
{
"category": "general",
"text": "The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8382",
"url": "https://www.suse.com/security/cve/CVE-2015-8382"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8382",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8382",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8382"
},
{
"cve": "CVE-2015-8383",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8383"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8383",
"url": "https://www.suse.com/security/cve/CVE-2015-8383"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8383",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8383",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8383"
},
{
"cve": "CVE-2015-8384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8384"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?J)(?\u0027d\u0027(?\u0027d\u0027\\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8384",
"url": "https://www.suse.com/security/cve/CVE-2015-8384"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8384",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8384"
},
{
"cve": "CVE-2015-8385",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8385"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?|(\\k\u0027Pm\u0027)|(?\u0027Pm\u0027))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8385",
"url": "https://www.suse.com/security/cve/CVE-2015-8385"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8385",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8385",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8385"
},
{
"cve": "CVE-2015-8386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8386"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8386",
"url": "https://www.suse.com/security/cve/CVE-2015-8386"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8386",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8386",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8386"
},
{
"cve": "CVE-2015-8387",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8387"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8387",
"url": "https://www.suse.com/security/cve/CVE-2015-8387"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8387",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8387",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8387"
},
{
"cve": "CVE-2015-8388",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8388"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?=di(?\u003c=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8388",
"url": "https://www.suse.com/security/cve/CVE-2015-8388"
},
{
"category": "external",
"summary": "SUSE Bug 936227 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/936227"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8388",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8388"
},
{
"cve": "CVE-2015-8389",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8389"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8389",
"url": "https://www.suse.com/security/cve/CVE-2015-8389"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8389",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8389",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8389"
},
{
"cve": "CVE-2015-8390",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8390"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the [: and \\\\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8390",
"url": "https://www.suse.com/security/cve/CVE-2015-8390"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8390",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8390",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8390"
},
{
"cve": "CVE-2015-8391",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8391"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8391",
"url": "https://www.suse.com/security/cve/CVE-2015-8391"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8391",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8391",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8391"
},
{
"cve": "CVE-2015-8392",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8392"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8392",
"url": "https://www.suse.com/security/cve/CVE-2015-8392"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8392",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8392"
},
{
"cve": "CVE-2015-8393",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8393"
}
],
"notes": [
{
"category": "general",
"text": "pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8393",
"url": "https://www.suse.com/security/cve/CVE-2015-8393"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8393",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8393",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8393"
},
{
"cve": "CVE-2015-8394",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8394"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles the (?(\u003cdigits\u003e) and (?(R\u003cdigits\u003e) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8394",
"url": "https://www.suse.com/security/cve/CVE-2015-8394"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8394",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8394",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8394"
},
{
"cve": "CVE-2015-8395",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8395"
}
],
"notes": [
{
"category": "general",
"text": "PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8395",
"url": "https://www.suse.com/security/cve/CVE-2015-8395"
},
{
"category": "external",
"summary": "SUSE Bug 906574 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/906574"
},
{
"category": "external",
"summary": "SUSE Bug 957598 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/957598"
},
{
"category": "external",
"summary": "SUSE Bug 958373 for CVE-2015-8395",
"url": "https://bugzilla.suse.com/958373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2015-8395"
},
{
"cve": "CVE-2015-8806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8806"
}
],
"notes": [
{
"category": "general",
"text": "dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the \"\u003c!DOCTYPE html\" substring in a crafted HTML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8806",
"url": "https://www.suse.com/security/cve/CVE-2015-8806"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/963963"
},
{
"category": "external",
"summary": "SUSE Bug 965283 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/965283"
},
{
"category": "external",
"summary": "SUSE Bug 981114 for CVE-2015-8806",
"url": "https://bugzilla.suse.com/981114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8806"
},
{
"cve": "CVE-2015-8842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8842"
}
],
"notes": [
{
"category": "general",
"text": "tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8842",
"url": "https://www.suse.com/security/cve/CVE-2015-8842"
},
{
"category": "external",
"summary": "SUSE Bug 972612 for CVE-2015-8842",
"url": "https://bugzilla.suse.com/972612"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8842"
},
{
"cve": "CVE-2015-8853",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8853"
}
],
"notes": [
{
"category": "general",
"text": "The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by \"a\\x80.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8853",
"url": "https://www.suse.com/security/cve/CVE-2015-8853"
},
{
"category": "external",
"summary": "SUSE Bug 976584 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/976584"
},
{
"category": "external",
"summary": "SUSE Bug 997948 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/997948"
},
{
"category": "external",
"summary": "SUSE Bug 997950 for CVE-2015-8853",
"url": "https://bugzilla.suse.com/997950"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8853"
},
{
"cve": "CVE-2015-8948",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2015-8948"
}
],
"notes": [
{
"category": "general",
"text": "idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2015-8948",
"url": "https://www.suse.com/security/cve/CVE-2015-8948"
},
{
"category": "external",
"summary": "SUSE Bug 1014473 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1014473"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 1190777 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/1190777"
},
{
"category": "external",
"summary": "SUSE Bug 990189 for CVE-2015-8948",
"url": "https://bugzilla.suse.com/990189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2015-8948"
},
{
"cve": "CVE-2016-0634",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0634"
}
],
"notes": [
{
"category": "general",
"text": "The expansion of \u0027\\h\u0027 in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in \u0027hostname\u0027 of a machine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0634",
"url": "https://www.suse.com/security/cve/CVE-2016-0634"
},
{
"category": "external",
"summary": "SUSE Bug 1000396 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1000396"
},
{
"category": "external",
"summary": "SUSE Bug 1001299 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1001299"
},
{
"category": "external",
"summary": "SUSE Bug 1159416 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1159416"
},
{
"category": "external",
"summary": "SUSE Bug 1188388 for CVE-2016-0634",
"url": "https://bugzilla.suse.com/1188388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-0634"
},
{
"cve": "CVE-2016-0718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0718"
}
],
"notes": [
{
"category": "general",
"text": "Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0718",
"url": "https://www.suse.com/security/cve/CVE-2016-0718"
},
{
"category": "external",
"summary": "SUSE Bug 979441 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/979441"
},
{
"category": "external",
"summary": "SUSE Bug 991809 for CVE-2016-0718",
"url": "https://bugzilla.suse.com/991809"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-0718"
},
{
"cve": "CVE-2016-0787",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-0787"
}
],
"notes": [
{
"category": "general",
"text": "The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a \"bits/bytes confusion bug.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-0787",
"url": "https://www.suse.com/security/cve/CVE-2016-0787"
},
{
"category": "external",
"summary": "SUSE Bug 1149968 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/1149968"
},
{
"category": "external",
"summary": "SUSE Bug 967026 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/967026"
},
{
"category": "external",
"summary": "SUSE Bug 968174 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/968174"
},
{
"category": "external",
"summary": "SUSE Bug 974691 for CVE-2016-0787",
"url": "https://bugzilla.suse.com/974691"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-0787"
},
{
"cve": "CVE-2016-1234",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1234"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1234",
"url": "https://www.suse.com/security/cve/CVE-2016-1234"
},
{
"category": "external",
"summary": "SUSE Bug 1020940 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/1020940"
},
{
"category": "external",
"summary": "SUSE Bug 969727 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/969727"
},
{
"category": "external",
"summary": "SUSE Bug 988770 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/988770"
},
{
"category": "external",
"summary": "SUSE Bug 988782 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/988782"
},
{
"category": "external",
"summary": "SUSE Bug 989127 for CVE-2016-1234",
"url": "https://bugzilla.suse.com/989127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1234"
},
{
"cve": "CVE-2016-1238",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1238"
}
],
"notes": [
{
"category": "general",
"text": "(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1238",
"url": "https://www.suse.com/security/cve/CVE-2016-1238"
},
{
"category": "external",
"summary": "SUSE Bug 1108749 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1108749"
},
{
"category": "external",
"summary": "SUSE Bug 1123389 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/1123389"
},
{
"category": "external",
"summary": "SUSE Bug 987887 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/987887"
},
{
"category": "external",
"summary": "SUSE Bug 988311 for CVE-2016-1238",
"url": "https://bugzilla.suse.com/988311"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1238"
},
{
"cve": "CVE-2016-1283",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1283"
}
],
"notes": [
{
"category": "general",
"text": "The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\\\"){99}-))(?J)(?\u0027R\u0027(?\u0027R\u0027\u003c((?\u0027RR\u0027(?\u0027R\u0027\\){97)?J)?J)(?\u0027R\u0027(?\u0027R\u0027\\){99|(:(?|(?\u0027R\u0027)(\\k\u0027R\u0027)|((?\u0027R\u0027)))H\u0027R\u0027R)(H\u0027R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1283",
"url": "https://www.suse.com/security/cve/CVE-2016-1283"
},
{
"category": "external",
"summary": "SUSE Bug 960837 for CVE-2016-1283",
"url": "https://bugzilla.suse.com/960837"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2016-1283"
},
{
"cve": "CVE-2016-1762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1762"
}
],
"notes": [
{
"category": "general",
"text": "The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1762",
"url": "https://www.suse.com/security/cve/CVE-2016-1762"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1762",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981040 for CVE-2016-1762",
"url": "https://bugzilla.suse.com/981040"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1762"
},
{
"cve": "CVE-2016-1833",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1833"
}
],
"notes": [
{
"category": "general",
"text": "The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1833",
"url": "https://www.suse.com/security/cve/CVE-2016-1833"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1833",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981108 for CVE-2016-1833",
"url": "https://bugzilla.suse.com/981108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1833"
},
{
"cve": "CVE-2016-1834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1834"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1834",
"url": "https://www.suse.com/security/cve/CVE-2016-1834"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1834",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981041 for CVE-2016-1834",
"url": "https://bugzilla.suse.com/981041"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1834"
},
{
"cve": "CVE-2016-1835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1835"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1835",
"url": "https://www.suse.com/security/cve/CVE-2016-1835"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1835",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981109 for CVE-2016-1835",
"url": "https://bugzilla.suse.com/981109"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1835"
},
{
"cve": "CVE-2016-1837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1837"
}
],
"notes": [
{
"category": "general",
"text": "Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1837",
"url": "https://www.suse.com/security/cve/CVE-2016-1837"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1837",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981111 for CVE-2016-1837",
"url": "https://bugzilla.suse.com/981111"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1837"
},
{
"cve": "CVE-2016-1838",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1838"
}
],
"notes": [
{
"category": "general",
"text": "The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1838",
"url": "https://www.suse.com/security/cve/CVE-2016-1838"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1838",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981112 for CVE-2016-1838",
"url": "https://bugzilla.suse.com/981112"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1838"
},
{
"cve": "CVE-2016-1839",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1839"
}
],
"notes": [
{
"category": "general",
"text": "The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1839",
"url": "https://www.suse.com/security/cve/CVE-2016-1839"
},
{
"category": "external",
"summary": "SUSE Bug 1039069 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1039069"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/963963"
},
{
"category": "external",
"summary": "SUSE Bug 981114 for CVE-2016-1839",
"url": "https://bugzilla.suse.com/981114"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1839"
},
{
"cve": "CVE-2016-1840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-1840"
}
],
"notes": [
{
"category": "general",
"text": "Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-1840",
"url": "https://www.suse.com/security/cve/CVE-2016-1840"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-1840",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981115 for CVE-2016-1840",
"url": "https://bugzilla.suse.com/981115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-1840"
},
{
"cve": "CVE-2016-2037",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2037"
}
],
"notes": [
{
"category": "general",
"text": "The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2037",
"url": "https://www.suse.com/security/cve/CVE-2016-2037"
},
{
"category": "external",
"summary": "SUSE Bug 1028410 for CVE-2016-2037",
"url": "https://bugzilla.suse.com/1028410"
},
{
"category": "external",
"summary": "SUSE Bug 963448 for CVE-2016-2037",
"url": "https://bugzilla.suse.com/963448"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2037"
},
{
"cve": "CVE-2016-2073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2073"
}
],
"notes": [
{
"category": "general",
"text": "The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2073",
"url": "https://www.suse.com/security/cve/CVE-2016-2073"
},
{
"category": "external",
"summary": "SUSE Bug 963963 for CVE-2016-2073",
"url": "https://bugzilla.suse.com/963963"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2073"
},
{
"cve": "CVE-2016-2105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2105"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2105",
"url": "https://www.suse.com/security/cve/CVE-2016-2105"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977614 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/977614"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 989902 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/989902"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/990369"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2016-2105",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-2105"
},
{
"cve": "CVE-2016-2106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2106"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2106",
"url": "https://www.suse.com/security/cve/CVE-2016-2106"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977615 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/977615"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 979279 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/979279"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2106",
"url": "https://bugzilla.suse.com/990369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-2106"
},
{
"cve": "CVE-2016-2107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2107"
}
],
"notes": [
{
"category": "general",
"text": "The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2107",
"url": "https://www.suse.com/security/cve/CVE-2016-2107"
},
{
"category": "external",
"summary": "SUSE Bug 976942 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/976942"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977616 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/977616"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/990369"
},
{
"category": "external",
"summary": "SUSE Bug 990370 for CVE-2016-2107",
"url": "https://bugzilla.suse.com/990370"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-2107"
},
{
"cve": "CVE-2016-2108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2108"
}
],
"notes": [
{
"category": "general",
"text": "The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the \"negative zero\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2108",
"url": "https://www.suse.com/security/cve/CVE-2016-2108"
},
{
"category": "external",
"summary": "SUSE Bug 1001502 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1001502"
},
{
"category": "external",
"summary": "SUSE Bug 1004499 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1004499"
},
{
"category": "external",
"summary": "SUSE Bug 1005878 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1005878"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/1148697"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 977617 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/977617"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 989345 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/989345"
},
{
"category": "external",
"summary": "SUSE Bug 996067 for CVE-2016-2108",
"url": "https://bugzilla.suse.com/996067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-2108"
},
{
"cve": "CVE-2016-2109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2109"
}
],
"notes": [
{
"category": "general",
"text": "The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2109",
"url": "https://www.suse.com/security/cve/CVE-2016-2109"
},
{
"category": "external",
"summary": "SUSE Bug 1015243 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/1015243"
},
{
"category": "external",
"summary": "SUSE Bug 976942 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/976942"
},
{
"category": "external",
"summary": "SUSE Bug 977584 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/977584"
},
{
"category": "external",
"summary": "SUSE Bug 978492 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/978492"
},
{
"category": "external",
"summary": "SUSE Bug 990369 for CVE-2016-2109",
"url": "https://bugzilla.suse.com/990369"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2109"
},
{
"cve": "CVE-2016-2177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2177"
}
],
"notes": [
{
"category": "general",
"text": "OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2177",
"url": "https://www.suse.com/security/cve/CVE-2016-2177"
},
{
"category": "external",
"summary": "SUSE Bug 982575 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/982575"
},
{
"category": "external",
"summary": "SUSE Bug 999075 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/999075"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2177",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-2177"
},
{
"cve": "CVE-2016-2178",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2178"
}
],
"notes": [
{
"category": "general",
"text": "The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2178",
"url": "https://www.suse.com/security/cve/CVE-2016-2178"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 983249 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983249"
},
{
"category": "external",
"summary": "SUSE Bug 983519 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/983519"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2178",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2178"
},
{
"cve": "CVE-2016-2179",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2179"
}
],
"notes": [
{
"category": "general",
"text": "The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2179",
"url": "https://www.suse.com/security/cve/CVE-2016-2179"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2179",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2179"
},
{
"cve": "CVE-2016-2180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2180"
}
],
"notes": [
{
"category": "general",
"text": "The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the \"openssl ts\" command.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2180",
"url": "https://www.suse.com/security/cve/CVE-2016-2180"
},
{
"category": "external",
"summary": "SUSE Bug 1003811 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/1003811"
},
{
"category": "external",
"summary": "SUSE Bug 990419 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/990419"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2180",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-2180"
},
{
"cve": "CVE-2016-2181",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2181"
}
],
"notes": [
{
"category": "general",
"text": "The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2181",
"url": "https://www.suse.com/security/cve/CVE-2016-2181"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994749 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/994749"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2181",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2181"
},
{
"cve": "CVE-2016-2182",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2182"
}
],
"notes": [
{
"category": "general",
"text": "The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2182",
"url": "https://www.suse.com/security/cve/CVE-2016-2182"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 993819 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/993819"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995959 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/995959"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-2182",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2182"
},
{
"cve": "CVE-2016-2183",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2183"
}
],
"notes": [
{
"category": "general",
"text": "The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a \"Sweet32\" attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2183",
"url": "https://www.suse.com/security/cve/CVE-2016-2183"
},
{
"category": "external",
"summary": "SUSE Bug 1001912 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1001912"
},
{
"category": "external",
"summary": "SUSE Bug 1024218 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1024218"
},
{
"category": "external",
"summary": "SUSE Bug 1027038 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1027038"
},
{
"category": "external",
"summary": "SUSE Bug 1034689 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1034689"
},
{
"category": "external",
"summary": "SUSE Bug 1056614 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1056614"
},
{
"category": "external",
"summary": "SUSE Bug 1171693 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/1171693"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995359 for CVE-2016-2183",
"url": "https://bugzilla.suse.com/995359"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2183"
},
{
"cve": "CVE-2016-2381",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-2381"
}
],
"notes": [
{
"category": "general",
"text": "Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-2381",
"url": "https://www.suse.com/security/cve/CVE-2016-2381"
},
{
"category": "external",
"summary": "SUSE Bug 967082 for CVE-2016-2381",
"url": "https://bugzilla.suse.com/967082"
},
{
"category": "external",
"summary": "SUSE Bug 992991 for CVE-2016-2381",
"url": "https://bugzilla.suse.com/992991"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-2381"
},
{
"cve": "CVE-2016-3075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3075"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3075",
"url": "https://www.suse.com/security/cve/CVE-2016-3075"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-3075",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 973164 for CVE-2016-3075",
"url": "https://bugzilla.suse.com/973164"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-3075"
},
{
"cve": "CVE-2016-3191",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3191"
}
],
"notes": [
{
"category": "general",
"text": "The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3191",
"url": "https://www.suse.com/security/cve/CVE-2016-3191"
},
{
"category": "external",
"summary": "SUSE Bug 971741 for CVE-2016-3191",
"url": "https://bugzilla.suse.com/971741"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-3191"
},
{
"cve": "CVE-2016-3627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3627"
}
],
"notes": [
{
"category": "general",
"text": "The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3627",
"url": "https://www.suse.com/security/cve/CVE-2016-3627"
},
{
"category": "external",
"summary": "SUSE Bug 1026099 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1026099"
},
{
"category": "external",
"summary": "SUSE Bug 1026101 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1026101"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 972335 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/972335"
},
{
"category": "external",
"summary": "SUSE Bug 975947 for CVE-2016-3627",
"url": "https://bugzilla.suse.com/975947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-3627"
},
{
"cve": "CVE-2016-3705",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3705"
}
],
"notes": [
{
"category": "general",
"text": "The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3705",
"url": "https://www.suse.com/security/cve/CVE-2016-3705"
},
{
"category": "external",
"summary": "SUSE Bug 1017497 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/1017497"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 975947 for CVE-2016-3705",
"url": "https://bugzilla.suse.com/975947"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-3705"
},
{
"cve": "CVE-2016-3706",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-3706"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-3706",
"url": "https://www.suse.com/security/cve/CVE-2016-3706"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 980483 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/980483"
},
{
"category": "external",
"summary": "SUSE Bug 997423 for CVE-2016-3706",
"url": "https://bugzilla.suse.com/997423"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-3706"
},
{
"cve": "CVE-2016-4008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4008"
}
],
"notes": [
{
"category": "general",
"text": "The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4008",
"url": "https://www.suse.com/security/cve/CVE-2016-4008"
},
{
"category": "external",
"summary": "SUSE Bug 982779 for CVE-2016-4008",
"url": "https://bugzilla.suse.com/982779"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4008"
},
{
"cve": "CVE-2016-4429",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4429"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4429",
"url": "https://www.suse.com/security/cve/CVE-2016-4429"
},
{
"category": "external",
"summary": "SUSE Bug 1081556 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/1081556"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/1123874"
},
{
"category": "external",
"summary": "SUSE Bug 980854 for CVE-2016-4429",
"url": "https://bugzilla.suse.com/980854"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-4429"
},
{
"cve": "CVE-2016-4447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4447"
}
],
"notes": [
{
"category": "general",
"text": "The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4447",
"url": "https://www.suse.com/security/cve/CVE-2016-4447"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4447",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981548 for CVE-2016-4447",
"url": "https://bugzilla.suse.com/981548"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4447"
},
{
"cve": "CVE-2016-4448",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4448"
}
],
"notes": [
{
"category": "general",
"text": "Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4448",
"url": "https://www.suse.com/security/cve/CVE-2016-4448"
},
{
"category": "external",
"summary": "SUSE Bug 1010299 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/1010299"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981549 for CVE-2016-4448",
"url": "https://bugzilla.suse.com/981549"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4448"
},
{
"cve": "CVE-2016-4449",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4449"
}
],
"notes": [
{
"category": "general",
"text": "XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4449",
"url": "https://www.suse.com/security/cve/CVE-2016-4449"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4449",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 981550 for CVE-2016-4449",
"url": "https://bugzilla.suse.com/981550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4449"
},
{
"cve": "CVE-2016-4483",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4483"
}
],
"notes": [
{
"category": "general",
"text": "The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4483",
"url": "https://www.suse.com/security/cve/CVE-2016-4483"
},
{
"category": "external",
"summary": "SUSE Bug 1026101 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/1026101"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 978395 for CVE-2016-4483",
"url": "https://bugzilla.suse.com/978395"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-4483"
},
{
"cve": "CVE-2016-4574",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4574"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4574",
"url": "https://www.suse.com/security/cve/CVE-2016-4574"
},
{
"category": "external",
"summary": "SUSE Bug 1135436 for CVE-2016-4574",
"url": "https://bugzilla.suse.com/1135436"
},
{
"category": "external",
"summary": "SUSE Bug 979261 for CVE-2016-4574",
"url": "https://bugzilla.suse.com/979261"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-4574"
},
{
"cve": "CVE-2016-4579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4579"
}
],
"notes": [
{
"category": "general",
"text": "Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the \"returned length of the object from _ksba_ber_parse_tl.\"",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4579",
"url": "https://www.suse.com/security/cve/CVE-2016-4579"
},
{
"category": "external",
"summary": "SUSE Bug 1135436 for CVE-2016-4579",
"url": "https://bugzilla.suse.com/1135436"
},
{
"category": "external",
"summary": "SUSE Bug 979906 for CVE-2016-4579",
"url": "https://bugzilla.suse.com/979906"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4579"
},
{
"cve": "CVE-2016-4658",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-4658"
}
],
"notes": [
{
"category": "general",
"text": "xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-4658",
"url": "https://www.suse.com/security/cve/CVE-2016-4658"
},
{
"category": "external",
"summary": "SUSE Bug 1005544 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1005544"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1078813 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1078813"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-4658",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2016-5011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5011"
}
],
"notes": [
{
"category": "general",
"text": "The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5011",
"url": "https://www.suse.com/security/cve/CVE-2016-5011"
},
{
"category": "external",
"summary": "SUSE Bug 988361 for CVE-2016-5011",
"url": "https://bugzilla.suse.com/988361"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-5011"
},
{
"cve": "CVE-2016-5300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5300"
}
],
"notes": [
{
"category": "general",
"text": "The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5300",
"url": "https://www.suse.com/security/cve/CVE-2016-5300"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2016-5300",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-5300"
},
{
"cve": "CVE-2016-5419",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5419"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5419",
"url": "https://www.suse.com/security/cve/CVE-2016-5419"
},
{
"category": "external",
"summary": "SUSE Bug 1033413 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/1033413"
},
{
"category": "external",
"summary": "SUSE Bug 1033442 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/1033442"
},
{
"category": "external",
"summary": "SUSE Bug 991389 for CVE-2016-5419",
"url": "https://bugzilla.suse.com/991389"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-5419"
},
{
"cve": "CVE-2016-5420",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5420"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5420",
"url": "https://www.suse.com/security/cve/CVE-2016-5420"
},
{
"category": "external",
"summary": "SUSE Bug 991390 for CVE-2016-5420",
"url": "https://bugzilla.suse.com/991390"
},
{
"category": "external",
"summary": "SUSE Bug 997420 for CVE-2016-5420",
"url": "https://bugzilla.suse.com/997420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-5420"
},
{
"cve": "CVE-2016-5421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-5421"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-5421",
"url": "https://www.suse.com/security/cve/CVE-2016-5421"
},
{
"category": "external",
"summary": "SUSE Bug 991391 for CVE-2016-5421",
"url": "https://bugzilla.suse.com/991391"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-5421"
},
{
"cve": "CVE-2016-6185",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6185"
}
],
"notes": [
{
"category": "general",
"text": "The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6185",
"url": "https://www.suse.com/security/cve/CVE-2016-6185"
},
{
"category": "external",
"summary": "SUSE Bug 988311 for CVE-2016-6185",
"url": "https://bugzilla.suse.com/988311"
},
{
"category": "external",
"summary": "SUSE Bug 999993 for CVE-2016-6185",
"url": "https://bugzilla.suse.com/999993"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6185"
},
{
"cve": "CVE-2016-6261",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6261"
}
],
"notes": [
{
"category": "general",
"text": "The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6261",
"url": "https://www.suse.com/security/cve/CVE-2016-6261"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 990190 for CVE-2016-6261",
"url": "https://bugzilla.suse.com/990190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-6261"
},
{
"cve": "CVE-2016-6262",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6262"
}
],
"notes": [
{
"category": "general",
"text": "idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6262",
"url": "https://www.suse.com/security/cve/CVE-2016-6262"
},
{
"category": "external",
"summary": "SUSE Bug 1014473 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1014473"
},
{
"category": "external",
"summary": "SUSE Bug 1173590 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1173590"
},
{
"category": "external",
"summary": "SUSE Bug 1190777 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/1190777"
},
{
"category": "external",
"summary": "SUSE Bug 990189 for CVE-2016-6262",
"url": "https://bugzilla.suse.com/990189"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6262"
},
{
"cve": "CVE-2016-6263",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6263"
}
],
"notes": [
{
"category": "general",
"text": "The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6263",
"url": "https://www.suse.com/security/cve/CVE-2016-6263"
},
{
"category": "external",
"summary": "SUSE Bug 1118435 for CVE-2016-6263",
"url": "https://bugzilla.suse.com/1118435"
},
{
"category": "external",
"summary": "SUSE Bug 990191 for CVE-2016-6263",
"url": "https://bugzilla.suse.com/990191"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-6263"
},
{
"cve": "CVE-2016-6302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6302"
}
],
"notes": [
{
"category": "general",
"text": "The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6302",
"url": "https://www.suse.com/security/cve/CVE-2016-6302"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995324 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/995324"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6302",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6302"
},
{
"cve": "CVE-2016-6303",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6303"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6303",
"url": "https://www.suse.com/security/cve/CVE-2016-6303"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 1115893 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/1115893"
},
{
"category": "external",
"summary": "SUSE Bug 994844 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/994844"
},
{
"category": "external",
"summary": "SUSE Bug 995377 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/995377"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6303",
"url": "https://bugzilla.suse.com/999665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6303"
},
{
"cve": "CVE-2016-6304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6304"
}
],
"notes": [
{
"category": "general",
"text": "Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6304",
"url": "https://www.suse.com/security/cve/CVE-2016-6304"
},
{
"category": "external",
"summary": "SUSE Bug 1001706 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1001706"
},
{
"category": "external",
"summary": "SUSE Bug 1003811 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1003811"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 1005579 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1005579"
},
{
"category": "external",
"summary": "SUSE Bug 1021375 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/1021375"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999666 for CVE-2016-6304",
"url": "https://bugzilla.suse.com/999666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6304"
},
{
"cve": "CVE-2016-6306",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6306"
}
],
"notes": [
{
"category": "general",
"text": "The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6306",
"url": "https://www.suse.com/security/cve/CVE-2016-6306"
},
{
"category": "external",
"summary": "SUSE Bug 1004104 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/1004104"
},
{
"category": "external",
"summary": "SUSE Bug 999665 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999665"
},
{
"category": "external",
"summary": "SUSE Bug 999668 for CVE-2016-6306",
"url": "https://bugzilla.suse.com/999668"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-6306"
},
{
"cve": "CVE-2016-6313",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6313"
}
],
"notes": [
{
"category": "general",
"text": "The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6313",
"url": "https://www.suse.com/security/cve/CVE-2016-6313"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/1123792"
},
{
"category": "external",
"summary": "SUSE Bug 994157 for CVE-2016-6313",
"url": "https://bugzilla.suse.com/994157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6313"
},
{
"cve": "CVE-2016-6318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-6318"
}
],
"notes": [
{
"category": "general",
"text": "Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-6318",
"url": "https://www.suse.com/security/cve/CVE-2016-6318"
},
{
"category": "external",
"summary": "SUSE Bug 1123113 for CVE-2016-6318",
"url": "https://bugzilla.suse.com/1123113"
},
{
"category": "external",
"summary": "SUSE Bug 992966 for CVE-2016-6318",
"url": "https://bugzilla.suse.com/992966"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-6318"
},
{
"cve": "CVE-2016-7056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7056"
}
],
"notes": [
{
"category": "general",
"text": "A timing attack flaw was found in OpenSSL 1.0.1u and before that could allow a malicious user with local access to recover ECDSA P-256 private keys.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7056",
"url": "https://www.suse.com/security/cve/CVE-2016-7056"
},
{
"category": "external",
"summary": "SUSE Bug 1005878 for CVE-2016-7056",
"url": "https://bugzilla.suse.com/1005878"
},
{
"category": "external",
"summary": "SUSE Bug 1019334 for CVE-2016-7056",
"url": "https://bugzilla.suse.com/1019334"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2016-7056",
"url": "https://bugzilla.suse.com/1148697"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-7056"
},
{
"cve": "CVE-2016-7141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7141"
}
],
"notes": [
{
"category": "general",
"text": "curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7141",
"url": "https://www.suse.com/security/cve/CVE-2016-7141"
},
{
"category": "external",
"summary": "SUSE Bug 991390 for CVE-2016-7141",
"url": "https://bugzilla.suse.com/991390"
},
{
"category": "external",
"summary": "SUSE Bug 997420 for CVE-2016-7141",
"url": "https://bugzilla.suse.com/997420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-7141"
},
{
"cve": "CVE-2016-7167",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7167"
}
],
"notes": [
{
"category": "general",
"text": "Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7167",
"url": "https://www.suse.com/security/cve/CVE-2016-7167"
},
{
"category": "external",
"summary": "SUSE Bug 998760 for CVE-2016-7167",
"url": "https://bugzilla.suse.com/998760"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-7167"
},
{
"cve": "CVE-2016-7543",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7543"
}
],
"notes": [
{
"category": "general",
"text": "Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7543",
"url": "https://www.suse.com/security/cve/CVE-2016-7543"
},
{
"category": "external",
"summary": "SUSE Bug 1001299 for CVE-2016-7543",
"url": "https://bugzilla.suse.com/1001299"
},
{
"category": "external",
"summary": "SUSE Bug 1159416 for CVE-2016-7543",
"url": "https://bugzilla.suse.com/1159416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-7543"
},
{
"cve": "CVE-2016-7796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-7796"
}
],
"notes": [
{
"category": "general",
"text": "The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-7796",
"url": "https://www.suse.com/security/cve/CVE-2016-7796"
},
{
"category": "external",
"summary": "SUSE Bug 1001765 for CVE-2016-7796",
"url": "https://bugzilla.suse.com/1001765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-7796"
},
{
"cve": "CVE-2016-8610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8610"
}
],
"notes": [
{
"category": "general",
"text": "A denial of service flaw was found in OpenSSL 0.9.8, 1.0.1, 1.0.2 through 1.0.2h, and 1.1.0 in the way the TLS/SSL protocol defined processing of ALERT packets during a connection handshake. A remote attacker could use this flaw to make a TLS/SSL server consume an excessive amount of CPU and fail to accept connections from other clients.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8610",
"url": "https://www.suse.com/security/cve/CVE-2016-8610"
},
{
"category": "external",
"summary": "SUSE Bug 1005878 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1005878"
},
{
"category": "external",
"summary": "SUSE Bug 1005879 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1005879"
},
{
"category": "external",
"summary": "SUSE Bug 1110018 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1110018"
},
{
"category": "external",
"summary": "SUSE Bug 1120592 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1120592"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 1148697 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/1148697"
},
{
"category": "external",
"summary": "SUSE Bug 982575 for CVE-2016-8610",
"url": "https://bugzilla.suse.com/982575"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2016-8610"
},
{
"cve": "CVE-2016-8615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8615"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8615",
"url": "https://www.suse.com/security/cve/CVE-2016-8615"
},
{
"category": "external",
"summary": "SUSE Bug 1005633 for CVE-2016-8615",
"url": "https://bugzilla.suse.com/1005633"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8615"
},
{
"cve": "CVE-2016-8616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8616"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8616",
"url": "https://www.suse.com/security/cve/CVE-2016-8616"
},
{
"category": "external",
"summary": "SUSE Bug 1005634 for CVE-2016-8616",
"url": "https://bugzilla.suse.com/1005634"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-8616"
},
{
"cve": "CVE-2016-8617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8617"
}
],
"notes": [
{
"category": "general",
"text": "The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8617",
"url": "https://www.suse.com/security/cve/CVE-2016-8617"
},
{
"category": "external",
"summary": "SUSE Bug 1005635 for CVE-2016-8617",
"url": "https://bugzilla.suse.com/1005635"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-8617"
},
{
"cve": "CVE-2016-8618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8618"
}
],
"notes": [
{
"category": "general",
"text": "The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8618",
"url": "https://www.suse.com/security/cve/CVE-2016-8618"
},
{
"category": "external",
"summary": "SUSE Bug 1005637 for CVE-2016-8618",
"url": "https://bugzilla.suse.com/1005637"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8618"
},
{
"cve": "CVE-2016-8619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8619"
}
],
"notes": [
{
"category": "general",
"text": "The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8619",
"url": "https://www.suse.com/security/cve/CVE-2016-8619"
},
{
"category": "external",
"summary": "SUSE Bug 1005638 for CVE-2016-8619",
"url": "https://bugzilla.suse.com/1005638"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8619"
},
{
"cve": "CVE-2016-8620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8620"
}
],
"notes": [
{
"category": "general",
"text": "The \u0027globbing\u0027 feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8620",
"url": "https://www.suse.com/security/cve/CVE-2016-8620"
},
{
"category": "external",
"summary": "SUSE Bug 1005640 for CVE-2016-8620",
"url": "https://bugzilla.suse.com/1005640"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-8620"
},
{
"cve": "CVE-2016-8621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8621"
}
],
"notes": [
{
"category": "general",
"text": "The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8621",
"url": "https://www.suse.com/security/cve/CVE-2016-8621"
},
{
"category": "external",
"summary": "SUSE Bug 1005642 for CVE-2016-8621",
"url": "https://bugzilla.suse.com/1005642"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8621"
},
{
"cve": "CVE-2016-8622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8622"
}
],
"notes": [
{
"category": "general",
"text": "The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8622",
"url": "https://www.suse.com/security/cve/CVE-2016-8622"
},
{
"category": "external",
"summary": "SUSE Bug 1005643 for CVE-2016-8622",
"url": "https://bugzilla.suse.com/1005643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8622"
},
{
"cve": "CVE-2016-8623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8623"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8623",
"url": "https://www.suse.com/security/cve/CVE-2016-8623"
},
{
"category": "external",
"summary": "SUSE Bug 1005645 for CVE-2016-8623",
"url": "https://bugzilla.suse.com/1005645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-8623"
},
{
"cve": "CVE-2016-8624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-8624"
}
],
"notes": [
{
"category": "general",
"text": "curl before version 7.51.0 doesn\u0027t parse the authority component of the URL correctly when the host name part ends with a \u0027#\u0027 character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-8624",
"url": "https://www.suse.com/security/cve/CVE-2016-8624"
},
{
"category": "external",
"summary": "SUSE Bug 1005646 for CVE-2016-8624",
"url": "https://bugzilla.suse.com/1005646"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-8624"
},
{
"cve": "CVE-2016-9063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9063"
}
],
"notes": [
{
"category": "general",
"text": "An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox \u003c 50.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9063",
"url": "https://www.suse.com/security/cve/CVE-2016-9063"
},
{
"category": "external",
"summary": "SUSE Bug 1009026 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1009026"
},
{
"category": "external",
"summary": "SUSE Bug 1010424 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1010424"
},
{
"category": "external",
"summary": "SUSE Bug 1047240 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1047240"
},
{
"category": "external",
"summary": "SUSE Bug 1123115 for CVE-2016-9063",
"url": "https://bugzilla.suse.com/1123115"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2016-9063"
},
{
"cve": "CVE-2016-9318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9318"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9318",
"url": "https://www.suse.com/security/cve/CVE-2016-9318"
},
{
"category": "external",
"summary": "SUSE Bug 1010675 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1010675"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1019074 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1019074"
},
{
"category": "external",
"summary": "SUSE Bug 1118959 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1118959"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1123919"
},
{
"category": "external",
"summary": "SUSE Bug 1126613 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1126613"
},
{
"category": "external",
"summary": "SUSE Bug 1148896 for CVE-2016-9318",
"url": "https://bugzilla.suse.com/1148896"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-9318"
},
{
"cve": "CVE-2016-9586",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9586"
}
],
"notes": [
{
"category": "general",
"text": "curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl\u0027s implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9586",
"url": "https://www.suse.com/security/cve/CVE-2016-9586"
},
{
"category": "external",
"summary": "SUSE Bug 1015332 for CVE-2016-9586",
"url": "https://bugzilla.suse.com/1015332"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-9586"
},
{
"cve": "CVE-2016-9597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9597"
}
],
"notes": [
{
"category": "general",
"text": "It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9597",
"url": "https://www.suse.com/security/cve/CVE-2016-9597"
},
{
"category": "external",
"summary": "SUSE Bug 1014873 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1014873"
},
{
"category": "external",
"summary": "SUSE Bug 1017497 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1017497"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2016-9597",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-9597"
},
{
"cve": "CVE-2016-9840",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9840"
}
],
"notes": [
{
"category": "general",
"text": "inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9840",
"url": "https://www.suse.com/security/cve/CVE-2016-9840"
},
{
"category": "external",
"summary": "SUSE Bug 1003579 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1003579"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1023215 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1023215"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9840",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2016-9840"
},
{
"cve": "CVE-2016-9841",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9841"
}
],
"notes": [
{
"category": "general",
"text": "inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9841",
"url": "https://www.suse.com/security/cve/CVE-2016-9841"
},
{
"category": "external",
"summary": "SUSE Bug 1003579 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1003579"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1064070 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1064070"
},
{
"category": "external",
"summary": "SUSE Bug 1070162 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1070162"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9841",
"url": "https://bugzilla.suse.com/1127473"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "critical"
}
],
"title": "CVE-2016-9841"
},
{
"cve": "CVE-2016-9842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9842"
}
],
"notes": [
{
"category": "general",
"text": "The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9842",
"url": "https://www.suse.com/security/cve/CVE-2016-9842"
},
{
"category": "external",
"summary": "SUSE Bug 1003580 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1003580"
},
{
"category": "external",
"summary": "SUSE Bug 1022633 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1022633"
},
{
"category": "external",
"summary": "SUSE Bug 1023215 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1023215"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9842",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2016-9842"
},
{
"cve": "CVE-2016-9843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9843"
}
],
"notes": [
{
"category": "general",
"text": "The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9843",
"url": "https://www.suse.com/security/cve/CVE-2016-9843"
},
{
"category": "external",
"summary": "SUSE Bug 1003580 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1003580"
},
{
"category": "external",
"summary": "SUSE Bug 1013882 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1013882"
},
{
"category": "external",
"summary": "SUSE Bug 1038505 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1038505"
},
{
"category": "external",
"summary": "SUSE Bug 1062104 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1062104"
},
{
"category": "external",
"summary": "SUSE Bug 1116686 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1116686"
},
{
"category": "external",
"summary": "SUSE Bug 1120866 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1120866"
},
{
"category": "external",
"summary": "SUSE Bug 1123150 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1123150"
},
{
"category": "external",
"summary": "SUSE Bug 1127473 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1127473"
},
{
"category": "external",
"summary": "SUSE Bug 1184301 for CVE-2016-9843",
"url": "https://bugzilla.suse.com/1184301"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2016-9843"
},
{
"cve": "CVE-2017-1000100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000100"
}
],
"notes": [
{
"category": "general",
"text": "When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn\u0027t restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl\u0027s redirect protocols with --proto-redir and libcurl\u0027s with CURLOPT_REDIR_PROTOCOLS.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000100",
"url": "https://www.suse.com/security/cve/CVE-2017-1000100"
},
{
"category": "external",
"summary": "SUSE Bug 1051644 for CVE-2017-1000100",
"url": "https://bugzilla.suse.com/1051644"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-1000100"
},
{
"cve": "CVE-2017-1000101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000101"
}
],
"notes": [
{
"category": "general",
"text": "curl supports \"globbing\" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000101",
"url": "https://www.suse.com/security/cve/CVE-2017-1000101"
},
{
"category": "external",
"summary": "SUSE Bug 1051643 for CVE-2017-1000101",
"url": "https://bugzilla.suse.com/1051643"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-1000101"
},
{
"cve": "CVE-2017-1000366",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-1000366"
}
],
"notes": [
{
"category": "general",
"text": "glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-1000366",
"url": "https://www.suse.com/security/cve/CVE-2017-1000366"
},
{
"category": "external",
"summary": "SUSE Bug 1037551 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1037551"
},
{
"category": "external",
"summary": "SUSE Bug 1039357 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1039357"
},
{
"category": "external",
"summary": "SUSE Bug 1063847 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1063847"
},
{
"category": "external",
"summary": "SUSE Bug 1071319 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1071319"
},
{
"category": "external",
"summary": "SUSE Bug 1123874 for CVE-2017-1000366",
"url": "https://bugzilla.suse.com/1123874"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2017-1000366"
},
{
"cve": "CVE-2017-10684",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10684"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10684",
"url": "https://www.suse.com/security/cve/CVE-2017-10684"
},
{
"category": "external",
"summary": "SUSE Bug 1046858 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1046858"
},
{
"category": "external",
"summary": "SUSE Bug 1115932 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1115932"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-10684",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-10684"
},
{
"cve": "CVE-2017-10685",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-10685"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-10685",
"url": "https://www.suse.com/security/cve/CVE-2017-10685"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1115932 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1115932"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-10685",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-10685"
},
{
"cve": "CVE-2017-11112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11112"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11112",
"url": "https://www.suse.com/security/cve/CVE-2017-11112"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1047964 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1047964"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-11112",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-11112"
},
{
"cve": "CVE-2017-11113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-11113"
}
],
"notes": [
{
"category": "general",
"text": "In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-11113",
"url": "https://www.suse.com/security/cve/CVE-2017-11113"
},
{
"category": "external",
"summary": "SUSE Bug 1046853 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1046853"
},
{
"category": "external",
"summary": "SUSE Bug 1047965 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1047965"
},
{
"category": "external",
"summary": "SUSE Bug 1175501 for CVE-2017-11113",
"url": "https://bugzilla.suse.com/1175501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-11113"
},
{
"cve": "CVE-2017-2616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-2616"
}
],
"notes": [
{
"category": "general",
"text": "A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-2616",
"url": "https://www.suse.com/security/cve/CVE-2017-2616"
},
{
"category": "external",
"summary": "SUSE Bug 1023041 for CVE-2017-2616",
"url": "https://bugzilla.suse.com/1023041"
},
{
"category": "external",
"summary": "SUSE Bug 1123789 for CVE-2017-2616",
"url": "https://bugzilla.suse.com/1123789"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2017-2616"
},
{
"cve": "CVE-2017-3731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-3731"
}
],
"notes": [
{
"category": "general",
"text": "If an SSL/TLS server or client is running on a 32-bit host, and a specific cipher is being used, then a truncated packet can cause that server or client to perform an out-of-bounds read, usually resulting in a crash. For OpenSSL 1.1.0, the crash can be triggered when using CHACHA20/POLY1305; users should upgrade to 1.1.0d. For Openssl 1.0.2, the crash can be triggered when using RC4-MD5; users who have not disabled that algorithm should update to 1.0.2k.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-3731",
"url": "https://www.suse.com/security/cve/CVE-2017-3731"
},
{
"category": "external",
"summary": "SUSE Bug 1021641 for CVE-2017-3731",
"url": "https://bugzilla.suse.com/1021641"
},
{
"category": "external",
"summary": "SUSE Bug 1022085 for CVE-2017-3731",
"url": "https://bugzilla.suse.com/1022085"
},
{
"category": "external",
"summary": "SUSE Bug 1064118 for CVE-2017-3731",
"url": "https://bugzilla.suse.com/1064118"
},
{
"category": "external",
"summary": "SUSE Bug 1064119 for CVE-2017-3731",
"url": "https://bugzilla.suse.com/1064119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-3731"
},
{
"cve": "CVE-2017-6507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-6507"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle \u0027restart\u0027 operations removing AppArmor profiles that aren\u0027t found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what\u0027s done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-6507",
"url": "https://www.suse.com/security/cve/CVE-2017-6507"
},
{
"category": "external",
"summary": "SUSE Bug 1029696 for CVE-2017-6507",
"url": "https://bugzilla.suse.com/1029696"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-6507"
},
{
"cve": "CVE-2017-7407",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7407"
}
],
"notes": [
{
"category": "general",
"text": "The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a \u0027%\u0027 character, which leads to a heap-based buffer over-read.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7407",
"url": "https://www.suse.com/security/cve/CVE-2017-7407"
},
{
"category": "external",
"summary": "SUSE Bug 1032309 for CVE-2017-7407",
"url": "https://bugzilla.suse.com/1032309"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2017-7407"
},
{
"cve": "CVE-2017-7526",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7526"
}
],
"notes": [
{
"category": "general",
"text": "libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7526",
"url": "https://www.suse.com/security/cve/CVE-2017-7526"
},
{
"category": "external",
"summary": "SUSE Bug 1046607 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1046607"
},
{
"category": "external",
"summary": "SUSE Bug 1047462 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1047462"
},
{
"category": "external",
"summary": "SUSE Bug 1123792 for CVE-2017-7526",
"url": "https://bugzilla.suse.com/1123792"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.9,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "low"
}
],
"title": "CVE-2017-7526"
},
{
"cve": "CVE-2017-9047",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9047"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses \u0027len\u0027 rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9047",
"url": "https://www.suse.com/security/cve/CVE-2017-9047"
},
{
"category": "external",
"summary": "SUSE Bug 1039063 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039063"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039657 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1039657"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9047",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-9047"
},
{
"cve": "CVE-2017-9048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9048"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer \u0027buf\u0027 of size \u0027size\u0027. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9048",
"url": "https://www.suse.com/security/cve/CVE-2017-9048"
},
{
"category": "external",
"summary": "SUSE Bug 1039064 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039064"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039658 for CVE-2017-9048",
"url": "https://bugzilla.suse.com/1039658"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-9048"
},
{
"cve": "CVE-2017-9049",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9049"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9049",
"url": "https://www.suse.com/security/cve/CVE-2017-9049"
},
{
"category": "external",
"summary": "SUSE Bug 1039063 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039063"
},
{
"category": "external",
"summary": "SUSE Bug 1039064 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039064"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039659 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039659"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9049",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2017-9049"
},
{
"cve": "CVE-2017-9050",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9050"
}
],
"notes": [
{
"category": "general",
"text": "libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9050",
"url": "https://www.suse.com/security/cve/CVE-2017-9050"
},
{
"category": "external",
"summary": "SUSE Bug 1039066 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039066"
},
{
"category": "external",
"summary": "SUSE Bug 1039069 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039069"
},
{
"category": "external",
"summary": "SUSE Bug 1039661 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1039661"
},
{
"category": "external",
"summary": "SUSE Bug 1069433 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1069433"
},
{
"category": "external",
"summary": "SUSE Bug 1069690 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1069690"
},
{
"category": "external",
"summary": "SUSE Bug 1123919 for CVE-2017-9050",
"url": "https://bugzilla.suse.com/1123919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "moderate"
}
],
"title": "CVE-2017-9050"
},
{
"cve": "CVE-2017-9233",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9233"
}
],
"notes": [
{
"category": "general",
"text": "XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9233",
"url": "https://www.suse.com/security/cve/CVE-2017-9233"
},
{
"category": "external",
"summary": "SUSE Bug 1030296 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1030296"
},
{
"category": "external",
"summary": "SUSE Bug 1047236 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1047236"
},
{
"category": "external",
"summary": "SUSE Bug 1073350 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1073350"
},
{
"category": "external",
"summary": "SUSE Bug 1123115 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/1123115"
},
{
"category": "external",
"summary": "SUSE Bug 983216 for CVE-2017-9233",
"url": "https://bugzilla.suse.com/983216"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.ppc64le",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.s390x",
"SUSE Linux Enterprise Module for Containers 12:sles12sp1-docker-image-1.0.7-20171002.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-10-10T19:37:36Z",
"details": "important"
}
],
"title": "CVE-2017-9233"
}
]
}
RHSA-2014:1295
Vulnerability from csaf_redhat - Published: 2014-09-24 14:18 - Updated: 2025-11-21 17:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated bash Shift_JIS packages that fix one security issue are now\navailable for Red Hat Enterprise Linux 5 and 6.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nShift_JIS, also known as \"SJIS\", is a character encoding for the Japanese\nlanguage. This package provides bash support for the Shift_JIS encoding.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll users who require Shift_JIS encoding support with Bash built-in\nfunctions are advised to upgrade to these updated packages, which contain a\nbackported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:1295",
"url": "https://access.redhat.com/errata/RHSA-2014:1295"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/1200223",
"url": "https://access.redhat.com/articles/1200223"
},
{
"category": "external",
"summary": "1141597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1295.json"
}
],
"title": "Red Hat Security Advisory: bash Shift_JIS security update",
"tracking": {
"current_release_date": "2025-11-21T17:50:03+00:00",
"generator": {
"date": "2025-11-21T17:50:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:1295",
"initial_release_date": "2014-09-24T14:18:35+00:00",
"revision_history": [
{
"date": "2014-09-24T14:18:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-09-24T14:18:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:50:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "S-JIS for Red Hat Enteprise Linux 6 Server",
"product": {
"name": "S-JIS for Red Hat Enteprise Linux 6 Server",
"product_id": "6Server-SJIS-6.5.Z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_sjis:6"
}
}
},
{
"category": "product_name",
"name": "S-JIS for Red Hat Enteprise Linux 5 Server",
"product": {
"name": "S-JIS for Red Hat Enteprise Linux 5 Server",
"product_id": "5Server-SJIS-5.11.z",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_sjis:5"
}
}
}
],
"category": "product_family",
"name": "RHEL S-JIS Service"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"product_id": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"product": {
"name": "bash-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"product_id": "bash-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-33.el5_11.1.sjis.1.x86_64",
"product": {
"name": "bash-0:3.2-33.el5_11.1.sjis.1.x86_64",
"product_id": "bash-0:3.2-33.el5_11.1.sjis.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.x86_64",
"product": {
"name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.x86_64",
"product_id": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.i686",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.i686",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1.sjis.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.i686",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.i686",
"product_id": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1.sjis.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_5.1.sjis.1.i686",
"product": {
"name": "bash-0:4.1.2-15.el6_5.1.sjis.1.i686",
"product_id": "bash-0:4.1.2-15.el6_5.1.sjis.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_5.1.sjis.1.src",
"product": {
"name": "bash-0:4.1.2-15.el6_5.1.sjis.1.src",
"product_id": "bash-0:4.1.2-15.el6_5.1.sjis.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1.sjis.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-33.el5_11.1.sjis.1.src",
"product": {
"name": "bash-0:3.2-33.el5_11.1.sjis.1.src",
"product_id": "bash-0:3.2-33.el5_11.1.sjis.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-0:3.2-33.el5_11.1.sjis.1.ia64",
"product": {
"name": "bash-0:3.2-33.el5_11.1.sjis.1.ia64",
"product_id": "bash-0:3.2-33.el5_11.1.sjis.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.ia64",
"product": {
"name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.ia64",
"product_id": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-0:3.2-33.el5_11.1.sjis.1.i386",
"product": {
"name": "bash-0:3.2-33.el5_11.1.sjis.1.i386",
"product_id": "bash-0:3.2-33.el5_11.1.sjis.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5_11.1.sjis.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.i386",
"product": {
"name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.i386",
"product_id": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5_11.1.sjis.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5_11.1.sjis.1.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server",
"product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.i386"
},
"product_reference": "bash-0:3.2-33.el5_11.1.sjis.1.i386",
"relates_to_product_reference": "5Server-SJIS-5.11.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5_11.1.sjis.1.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server",
"product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.ia64"
},
"product_reference": "bash-0:3.2-33.el5_11.1.sjis.1.ia64",
"relates_to_product_reference": "5Server-SJIS-5.11.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5_11.1.sjis.1.src as a component of S-JIS for Red Hat Enteprise Linux 5 Server",
"product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.src"
},
"product_reference": "bash-0:3.2-33.el5_11.1.sjis.1.src",
"relates_to_product_reference": "5Server-SJIS-5.11.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5_11.1.sjis.1.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server",
"product_id": "5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.x86_64"
},
"product_reference": "bash-0:3.2-33.el5_11.1.sjis.1.x86_64",
"relates_to_product_reference": "5Server-SJIS-5.11.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.i386 as a component of S-JIS for Red Hat Enteprise Linux 5 Server",
"product_id": "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.i386"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.i386",
"relates_to_product_reference": "5Server-SJIS-5.11.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.ia64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server",
"product_id": "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.ia64"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.ia64",
"relates_to_product_reference": "5Server-SJIS-5.11.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 5 Server",
"product_id": "5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.x86_64"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.x86_64",
"relates_to_product_reference": "5Server-SJIS-5.11.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.sjis.1.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server",
"product_id": "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.sjis.1.i686",
"relates_to_product_reference": "6Server-SJIS-6.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.sjis.1.src as a component of S-JIS for Red Hat Enteprise Linux 6 Server",
"product_id": "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.sjis.1.src",
"relates_to_product_reference": "6Server-SJIS-6.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.sjis.1.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server",
"product_id": "6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"relates_to_product_reference": "6Server-SJIS-6.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server",
"product_id": "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.i686",
"relates_to_product_reference": "6Server-SJIS-6.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server",
"product_id": "6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"relates_to_product_reference": "6Server-SJIS-6.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.i686 as a component of S-JIS for Red Hat Enteprise Linux 6 Server",
"product_id": "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.i686",
"relates_to_product_reference": "6Server-SJIS-6.5.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.x86_64 as a component of S-JIS for Red Hat Enteprise Linux 6 Server",
"product_id": "6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"relates_to_product_reference": "6Server-SJIS-6.5.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-6271",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2014-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1141597"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bash: specially-crafted environment variables can be used to inject shell commands",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.i386",
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.ia64",
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.src",
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.x86_64",
"5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.i386",
"5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.ia64",
"5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.x86_64",
"6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.i686",
"6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.src",
"6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.i686",
"6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.1.i686",
"6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6271"
},
{
"category": "external",
"summary": "RHBZ#1141597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"category": "external",
"summary": "RHSB-shellshock",
"url": "https://access.redhat.com/security/vulnerabilities/shellshock"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/1200223",
"url": "https://access.redhat.com/articles/1200223"
},
{
"category": "external",
"summary": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack",
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2014-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-09-24T14:18:35+00:00",
"details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.i386",
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.ia64",
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.src",
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.x86_64",
"5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.i386",
"5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.ia64",
"5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.x86_64",
"6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.i686",
"6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.src",
"6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.i686",
"6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.1.i686",
"6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1295"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.i386",
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.ia64",
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.src",
"5Server-SJIS-5.11.z:bash-0:3.2-33.el5_11.1.sjis.1.x86_64",
"5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.i386",
"5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.ia64",
"5Server-SJIS-5.11.z:bash-debuginfo-0:3.2-33.el5_11.1.sjis.1.x86_64",
"6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.i686",
"6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.src",
"6Server-SJIS-6.5.Z:bash-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.i686",
"6Server-SJIS-6.5.Z:bash-debuginfo-0:4.1.2-15.el6_5.1.sjis.1.x86_64",
"6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.1.i686",
"6Server-SJIS-6.5.Z:bash-doc-0:4.1.2-15.el6_5.1.sjis.1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-01-28T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "bash: specially-crafted environment variables can be used to inject shell commands"
}
]
}
RHSA-2014:1293
Vulnerability from csaf_redhat - Published: 2014-09-24 15:11 - Updated: 2025-11-21 17:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:1293",
"url": "https://access.redhat.com/errata/RHSA-2014:1293"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/1200223",
"url": "https://access.redhat.com/articles/1200223"
},
{
"category": "external",
"summary": "1141597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1293.json"
}
],
"title": "Red Hat Security Advisory: bash security update",
"tracking": {
"current_release_date": "2025-11-21T17:50:03+00:00",
"generator": {
"date": "2025-11-21T17:50:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:1293",
"initial_release_date": "2014-09-24T15:11:29+00:00",
"revision_history": [
{
"date": "2014-09-24T15:11:29+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-09-24T15:11:29+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:50:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product": {
"name": "Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:7::workstation"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"product_id": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_5.1.x86_64",
"product": {
"name": "bash-0:4.1.2-15.el6_5.1.x86_64",
"product_id": "bash-0:4.1.2-15.el6_5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-33.el5.1.x86_64",
"product": {
"name": "bash-debuginfo-0:3.2-33.el5.1.x86_64",
"product_id": "bash-debuginfo-0:3.2-33.el5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-33.el5.1.x86_64",
"product": {
"name": "bash-0:3.2-33.el5.1.x86_64",
"product_id": "bash-0:3.2-33.el5.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"product": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"product_id": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"product": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"product_id": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.2.45-5.el7_0.2.x86_64",
"product": {
"name": "bash-0:4.2.45-5.el7_0.2.x86_64",
"product_id": "bash-0:4.2.45-5.el7_0.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_5.1.src",
"product": {
"name": "bash-0:4.1.2-15.el6_5.1.src",
"product_id": "bash-0:4.1.2-15.el6_5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-33.el5.1.src",
"product": {
"name": "bash-0:3.2-33.el5.1.src",
"product_id": "bash-0:3.2-33.el5.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.2.45-5.el7_0.2.src",
"product": {
"name": "bash-0:4.2.45-5.el7_0.2.src",
"product_id": "bash-0:4.2.45-5.el7_0.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"product_id": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_5.1.i686",
"product": {
"name": "bash-0:4.1.2-15.el6_5.1.i686",
"product_id": "bash-0:4.1.2-15.el6_5.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"product_id": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_5.1.s390x",
"product": {
"name": "bash-0:4.1.2-15.el6_5.1.s390x",
"product_id": "bash-0:4.1.2-15.el6_5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-33.el5.1.s390x",
"product": {
"name": "bash-debuginfo-0:3.2-33.el5.1.s390x",
"product_id": "bash-debuginfo-0:3.2-33.el5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-33.el5.1.s390x",
"product": {
"name": "bash-0:3.2-33.el5.1.s390x",
"product_id": "bash-0:3.2-33.el5.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"product": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"product_id": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"product": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"product_id": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.2.45-5.el7_0.2.s390x",
"product": {
"name": "bash-0:4.2.45-5.el7_0.2.s390x",
"product_id": "bash-0:4.2.45-5.el7_0.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"product_id": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_5.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_5.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_5.1.ppc64",
"product": {
"name": "bash-0:4.1.2-15.el6_5.1.ppc64",
"product_id": "bash-0:4.1.2-15.el6_5.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_5.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"product": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"product_id": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.2.45-5.el7_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"product": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"product_id": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.2.45-5.el7_0.2?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.2.45-5.el7_0.2.ppc64",
"product": {
"name": "bash-0:4.2.45-5.el7_0.2.ppc64",
"product_id": "bash-0:4.2.45-5.el7_0.2.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.2.45-5.el7_0.2?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-33.el5.1.i386",
"product": {
"name": "bash-debuginfo-0:3.2-33.el5.1.i386",
"product_id": "bash-debuginfo-0:3.2-33.el5.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-33.el5.1.i386",
"product": {
"name": "bash-0:3.2-33.el5.1.i386",
"product_id": "bash-0:3.2-33.el5.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5.1?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-33.el5.1.ia64",
"product": {
"name": "bash-debuginfo-0:3.2-33.el5.1.ia64",
"product_id": "bash-debuginfo-0:3.2-33.el5.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-33.el5.1.ia64",
"product": {
"name": "bash-0:3.2-33.el5.1.ia64",
"product_id": "bash-0:3.2-33.el5.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5.1?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-33.el5.1.ppc",
"product": {
"name": "bash-debuginfo-0:3.2-33.el5.1.ppc",
"product_id": "bash-debuginfo-0:3.2-33.el5.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-33.el5.1?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-33.el5.1.ppc",
"product": {
"name": "bash-0:3.2-33.el5.1.ppc",
"product_id": "bash-0:3.2-33.el5.1.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-33.el5.1?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-0:3.2-33.el5.1.i386"
},
"product_reference": "bash-0:3.2-33.el5.1.i386",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-0:3.2-33.el5.1.ia64"
},
"product_reference": "bash-0:3.2-33.el5.1.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-0:3.2-33.el5.1.ppc"
},
"product_reference": "bash-0:3.2-33.el5.1.ppc",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-0:3.2-33.el5.1.s390x"
},
"product_reference": "bash-0:3.2-33.el5.1.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-0:3.2-33.el5.1.src"
},
"product_reference": "bash-0:3.2-33.el5.1.src",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-0:3.2-33.el5.1.x86_64"
},
"product_reference": "bash-0:3.2-33.el5.1.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.i386"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.i386",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ia64"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.ia64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ppc"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.ppc",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.s390x"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.s390x",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.x86_64",
"relates_to_product_reference": "5Client-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-0:3.2-33.el5.1.i386"
},
"product_reference": "bash-0:3.2-33.el5.1.i386",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-0:3.2-33.el5.1.ia64"
},
"product_reference": "bash-0:3.2-33.el5.1.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-0:3.2-33.el5.1.ppc"
},
"product_reference": "bash-0:3.2-33.el5.1.ppc",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-0:3.2-33.el5.1.s390x"
},
"product_reference": "bash-0:3.2-33.el5.1.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-0:3.2-33.el5.1.src"
},
"product_reference": "bash-0:3.2-33.el5.1.src",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-33.el5.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-0:3.2-33.el5.1.x86_64"
},
"product_reference": "bash-0:3.2-33.el5.1.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.i386"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.i386",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ia64"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.ia64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ppc"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.ppc",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.s390x"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.s390x",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-33.el5.1.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:3.2-33.el5.1.x86_64",
"relates_to_product_reference": "5Server-5.11.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.src as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.src",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)",
"product_id": "6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Client-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.src",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)",
"product_id": "6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Client-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.src",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)",
"product_id": "6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.src",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)",
"product_id": "6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.src",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Server-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.src",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.src as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.src",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)",
"product_id": "6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Workstation-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.src",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.i686 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.i686",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.s390x",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_5.1.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)",
"product_id": "6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"relates_to_product_reference": "6Workstation-optional-6.5.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.src as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.src"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.src",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)",
"product_id": "7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Client-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.src",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Client Optional (v. 7)",
"product_id": "7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Client-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.src"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.src",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)",
"product_id": "7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7ComputeNode-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.src",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)",
"product_id": "7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7ComputeNode-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.src as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.src"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.src",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)",
"product_id": "7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Server-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.src",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7)",
"product_id": "7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Server-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.src"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.src",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)",
"product_id": "7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Workstation-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.src",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.ppc64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.s390x as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.s390x",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.2.45-5.el7_0.2.x86_64 as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)",
"product_id": "7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
},
"product_reference": "bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"relates_to_product_reference": "7Workstation-optional-7.0.Z"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-6271",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2014-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1141597"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bash: specially-crafted environment variables can be used to inject shell commands",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"5Client-5.11.Z:bash-0:3.2-33.el5.1.i386",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.ia64",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.ppc",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.s390x",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.src",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.x86_64",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.i386",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ia64",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ppc",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.s390x",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.x86_64",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.i386",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.ia64",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.ppc",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.s390x",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.src",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.x86_64",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.i386",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ia64",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ppc",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.s390x",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.x86_64",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6271"
},
{
"category": "external",
"summary": "RHBZ#1141597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"category": "external",
"summary": "RHSB-shellshock",
"url": "https://access.redhat.com/security/vulnerabilities/shellshock"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/1200223",
"url": "https://access.redhat.com/articles/1200223"
},
{
"category": "external",
"summary": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack",
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2014-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-09-24T15:11:29+00:00",
"details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258",
"product_ids": [
"5Client-5.11.Z:bash-0:3.2-33.el5.1.i386",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.ia64",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.ppc",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.s390x",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.src",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.x86_64",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.i386",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ia64",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ppc",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.s390x",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.x86_64",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.i386",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.ia64",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.ppc",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.s390x",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.src",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.x86_64",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.i386",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ia64",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ppc",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.s390x",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.x86_64",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1293"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"5Client-5.11.Z:bash-0:3.2-33.el5.1.i386",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.ia64",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.ppc",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.s390x",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.src",
"5Client-5.11.Z:bash-0:3.2-33.el5.1.x86_64",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.i386",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ia64",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ppc",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.s390x",
"5Client-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.x86_64",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.i386",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.ia64",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.ppc",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.s390x",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.src",
"5Server-5.11.Z:bash-0:3.2-33.el5.1.x86_64",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.i386",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ia64",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.ppc",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.s390x",
"5Server-5.11.Z:bash-debuginfo-0:3.2-33.el5.1.x86_64",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Client-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Client-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Client-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Client-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Client-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Client-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6ComputeNode-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6ComputeNode-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6ComputeNode-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Server-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Server-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Server-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Server-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Server-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Server-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Workstation-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.i686",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.src",
"6Workstation-optional-6.5.z:bash-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.i686",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-optional-6.5.z:bash-debuginfo-0:4.1.2-15.el6_5.1.x86_64",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.i686",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.ppc64",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.s390x",
"6Workstation-optional-6.5.z:bash-doc-0:4.1.2-15.el6_5.1.x86_64",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Client-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Client-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Client-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Client-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Client-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Client-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7ComputeNode-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7ComputeNode-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7ComputeNode-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Server-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Server-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Server-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Server-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Server-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Server-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Workstation-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.src",
"7Workstation-optional-7.0.Z:bash-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-optional-7.0.Z:bash-debuginfo-0:4.2.45-5.el7_0.2.x86_64",
"7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.ppc64",
"7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.s390x",
"7Workstation-optional-7.0.Z:bash-doc-0:4.2.45-5.el7_0.2.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-01-28T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "bash: specially-crafted environment variables can be used to inject shell commands"
}
]
}
RHSA-2014:1354
Vulnerability from csaf_redhat - Published: 2014-10-02 18:40 - Updated: 2025-11-21 17:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An updated rhev-hypervisor6 package that fixes several security issues is\nnow available.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The rhev-hypervisor6 package provides a Red Hat Enterprise Virtualization\nHypervisor ISO disk image. The Red Hat Enterprise Virtualization Hypervisor\nis a dedicated Kernel-based Virtual Machine (KVM) hypervisor. It includes\neverything necessary to run and manage virtual machines: a subset of the\nRed Hat Enterprise Linux operating environment and the Red Hat Enterprise\nVirtualization Agent.\n\nNote: Red Hat Enterprise Virtualization Hypervisor is only available for\nthe Intel 64 and AMD64 architectures with virtualization extensions.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain services\nand applications allow remote unauthenticated attackers to provide\nenvironment variables, allowing them to exploit this issue. (CVE-2014-6271)\n\nIt was found that the fix for CVE-2014-6271 was incomplete, and Bash still\nallowed certain characters to be injected into other environments via\nspecially crafted environment variables. An attacker could potentially use\nthis flaw to override or bypass environment restrictions to execute shell\ncommands. Certain services and applications allow remote unauthenticated\nattackers to provide environment variables, allowing them to exploit this\nissue. (CVE-2014-7169)\n\nA flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One)\ninput from certain RSA signatures. A remote attacker could use this flaw to\nforge RSA certificates by providing a specially crafted signature to an\napplication using NSS. (CVE-2014-1568)\n\nIt was discovered that the fixed-sized redir_stack could be forced to\noverflow in the Bash parser, resulting in memory corruption, and possibly\nleading to arbitrary code execution when evaluating untrusted input that\nwould not otherwise be run as code. (CVE-2014-7186)\n\nAn off-by-one error was discovered in the way Bash was handling deeply\nnested flow control constructs. Depending on the layout of the .bss\nsegment, this could allow arbitrary execution of code that would not\notherwise be executed by Bash. (CVE-2014-7187)\n\nRed Hat would like to thank Stephane Chazelas for reporting CVE-2014-6271,\nand the Mozilla project for reporting CVE-2014-1568. Upstream acknowledges\nAntoine Delignat-Lavaud and Intel Product Security Incident Response Team\nas the original reporters of CVE-2014-1568. The CVE-2014-7186 and\nCVE-2014-7187 issues were discovered by Florian Weimer of Red Hat Product\nSecurity.\n\nUsers of the Red Hat Enterprise Virtualization Hypervisor are advised to\nupgrade to this updated package.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:1354",
"url": "https://access.redhat.com/errata/RHSA-2014:1354"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "1141597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"category": "external",
"summary": "1145429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429"
},
{
"category": "external",
"summary": "1146319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319"
},
{
"category": "external",
"summary": "1146791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791"
},
{
"category": "external",
"summary": "1146804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1354.json"
}
],
"title": "Red Hat Security Advisory: rhev-hypervisor6 security update",
"tracking": {
"current_release_date": "2025-11-21T17:50:13+00:00",
"generator": {
"date": "2025-11-21T17:50:13+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:1354",
"initial_release_date": "2014-10-02T18:40:05+00:00",
"revision_history": [
{
"date": "2014-10-02T18:40:05+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-10-02T18:40:05+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:50:13+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "RHEV-M 3.4",
"product": {
"name": "RHEV-M 3.4",
"product_id": "6Server-RHEV-S-3.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhev_manager:3"
}
}
}
],
"category": "product_family",
"name": "Red Hat Virtualization"
},
{
"branches": [
{
"category": "product_version",
"name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src",
"product": {
"name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src",
"product_id": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"product": {
"name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"product_id": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rhev-hypervisor6@6.5-20140930.1.el6ev?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch as a component of RHEV-M 3.4",
"product_id": "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch"
},
"product_reference": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"relates_to_product_reference": "6Server-RHEV-S-3.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src as a component of RHEV-M 3.4",
"product_id": "6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
},
"product_reference": "rhev-hypervisor6-0:6.5-20140930.1.el6ev.src",
"relates_to_product_reference": "6Server-RHEV-S-3.4"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Mozilla project"
]
},
{
"names": [
"Antoine Delignat-Lavaud",
"Intel Product Security Incident Response Team"
],
"summary": "Acknowledged by upstream."
}
],
"cve": "CVE-2014-1568",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2014-09-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1145429"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way NSS parsed ASN.1 (Abstract Syntax Notation One) input from certain RSA signatures. A remote attacker could use this flaw to forge RSA certificates by providing a specially crafted signature to an application using NSS.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-1568"
},
{
"category": "external",
"summary": "RHBZ#1145429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1145429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-1568"
},
{
"category": "external",
"summary": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html",
"url": "http://www.mozilla.org/security/announce/2014/mfsa2014-73.html"
}
],
"release_date": "2014-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-10-02T18:40:05+00:00",
"details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html",
"product_ids": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1354"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"version": "2.0"
},
"products": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nss: RSA PKCS#1 signature verification forgery flaw (MFSA 2014-73)"
},
{
"cve": "CVE-2014-6271",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2014-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1141597"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bash: specially-crafted environment variables can be used to inject shell commands",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6271"
},
{
"category": "external",
"summary": "RHBZ#1141597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"category": "external",
"summary": "RHSB-shellshock",
"url": "https://access.redhat.com/security/vulnerabilities/shellshock"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/1200223",
"url": "https://access.redhat.com/articles/1200223"
},
{
"category": "external",
"summary": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack",
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2014-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-10-02T18:40:05+00:00",
"details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html",
"product_ids": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1354"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-01-28T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "bash: specially-crafted environment variables can be used to inject shell commands"
},
{
"cve": "CVE-2014-7169",
"cwe": {
"id": "CWE-228",
"name": "Improper Handling of Syntactically Invalid Structure"
},
"discovery_date": "2014-09-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1146319"
}
],
"notes": [
{
"category": "description",
"text": "It was found that the fix for CVE-2014-6271 was incomplete, and Bash still allowed certain characters to be injected into other environments via specially crafted environment variables. An attacker could potentially use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-7169"
},
{
"category": "external",
"summary": "RHBZ#1146319",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146319"
},
{
"category": "external",
"summary": "RHSB-shellshock",
"url": "https://access.redhat.com/security/vulnerabilities/shellshock"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-7169",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7169"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7169"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2014-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-10-02T18:40:05+00:00",
"details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html",
"product_ids": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1354"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "HIGH",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-01-28T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "bash: code execution via specially-crafted environment (Incomplete fix for CVE-2014-6271)"
},
{
"acknowledgments": [
{
"names": [
"Florian Weimer"
],
"organization": "Red Hat Product Security",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-7186",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2014-09-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1146791"
}
],
"notes": [
{
"category": "description",
"text": "It was identified that the fixed-sized redir_stack could be forced to overflow in the Bash parser, resulting in memory corruption, and possibly leading to arbitrary code execution when evaluating untrusted input that would not otherwise be run as code.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bash: parser can allow out-of-bounds memory access while handling redir_stack",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "A patch for this issue was applied to the bash packages in Red Hat Enterprise Linux via RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312. The errata do not mention the CVE in the description, as the CVE was only assigned after those updates were released.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-7186"
},
{
"category": "external",
"summary": "RHBZ#1146791",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146791"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7186"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7186"
}
],
"release_date": "2014-09-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-10-02T18:40:05+00:00",
"details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html",
"product_ids": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1354"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bash: parser can allow out-of-bounds memory access while handling redir_stack"
},
{
"acknowledgments": [
{
"names": [
"Florian Weimer"
],
"organization": "Red Hat Product Security",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2014-7187",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2014-09-26T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1146804"
}
],
"notes": [
{
"category": "description",
"text": "An off-by-one error was discovered in the way Bash was handling deeply nested flow control constructs. Depending on the layout of the .bss segment, this could allow arbitrary execution of code that would not otherwise be executed by Bash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bash: off-by-one error in deeply nested flow control constructs",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product Security does not consider this bug to have any security impact on the bash packages shipped in Red Hat Enterprise Linux. A fix for this issue was applied as a hardening in RHSA-2014:1306, RHSA-2014:1311, and RHSA-2014:1312.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-7187"
},
{
"category": "external",
"summary": "RHBZ#1146804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1146804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-7187",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7187"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7187"
}
],
"release_date": "2014-09-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-10-02T18:40:05+00:00",
"details": "This update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258\n\nTo upgrade Hypervisors in Red Hat Enterprise Virtualization environments\nusing the disk image provided by this package, refer to:\n\nhttps://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Hypervisor_Deployment_Guide/chap-Deployment_Guide-Upgrading_Red_Hat_Enterprise_Virtualization_Hypervisors.html",
"product_ids": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1354"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.noarch",
"6Server-RHEV-S-3.4:rhev-hypervisor6-0:6.5-20140930.1.el6ev.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "bash: off-by-one error in deeply nested flow control constructs"
}
]
}
RHSA-2014:1294
Vulnerability from csaf_redhat - Published: 2014-09-24 14:18 - Updated: 2025-11-21 17:50Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated bash packages that fix one security issue are now available for Red\nHat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise\nLinux 5.6 Long Life, Red Hat Enterprise Linux 5.9 Extended Update Support,\nRed Hat Enterprise Linux 6.2 Advanced Update Support, and Red Hat\nEnterprise Linux 6.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.",
"title": "Topic"
},
{
"category": "general",
"text": "The GNU Bourne Again shell (Bash) is a shell and command language\ninterpreter compatible with the Bourne shell (sh). Bash is the default\nshell for Red Hat Enterprise Linux.\n\nA flaw was found in the way Bash evaluated certain specially crafted\nenvironment variables. An attacker could use this flaw to override or\nbypass environment restrictions to execute shell commands. Certain\nservices and applications allow remote unauthenticated attackers to\nprovide environment variables, allowing them to exploit this issue.\n(CVE-2014-6271)\n\nFor additional information on the CVE-2014-6271 flaw, refer to the\nKnowledgebase article at https://access.redhat.com/articles/1200223\n\nRed Hat would like to thank Stephane Chazelas for reporting this issue.\n\nAll bash users are advised to upgrade to these updated packages, which\ncontain a backported patch to correct this issue.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2014:1294",
"url": "https://access.redhat.com/errata/RHSA-2014:1294"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#critical",
"url": "https://access.redhat.com/security/updates/classification/#critical"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/1200223",
"url": "https://access.redhat.com/articles/1200223"
},
{
"category": "external",
"summary": "1141597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1294.json"
}
],
"title": "Red Hat Security Advisory: bash security update",
"tracking": {
"current_release_date": "2025-11-21T17:50:03+00:00",
"generator": {
"date": "2025-11-21T17:50:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2014:1294",
"initial_release_date": "2014-09-24T14:18:45+00:00",
"revision_history": [
{
"date": "2014-09-24T14:18:45+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2014-09-24T14:18:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:50:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product": {
"name": "Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:5.6"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product": {
"name": "Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:5.9"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.4::computenode"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:6.4::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_mission_critical:6.2::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS (v. 4 ELS)",
"product": {
"name": "Red Hat Enterprise Linux AS (v. 4 ELS)",
"product_id": "4AS-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES (v. 4 ELS)",
"product": {
"name": "Red Hat Enterprise Linux ES (v. 4 ELS)",
"product_id": "4ES-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:4::es"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-0:3.2-24.el5_6.1.ia64",
"product": {
"name": "bash-0:3.2-24.el5_6.1.ia64",
"product_id": "bash-0:3.2-24.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-24.el5_6.1.ia64",
"product": {
"name": "bash-debuginfo-0:3.2-24.el5_6.1.ia64",
"product_id": "bash-debuginfo-0:3.2-24.el5_6.1.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.1?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-32.el5_9.2.ia64",
"product": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.ia64",
"product_id": "bash-debuginfo-0:3.2-32.el5_9.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-32.el5_9.2.ia64",
"product": {
"name": "bash-0:3.2-32.el5_9.2.ia64",
"product_id": "bash-0:3.2-32.el5_9.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.0-27.el4.2.ia64",
"product": {
"name": "bash-debuginfo-0:3.0-27.el4.2.ia64",
"product_id": "bash-debuginfo-0:3.0-27.el4.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.2?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.0-27.el4.2.ia64",
"product": {
"name": "bash-0:3.0-27.el4.2.ia64",
"product_id": "bash-0:3.0-27.el4.2.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.0-27.el4.2?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-0:3.2-24.el5_6.1.i386",
"product": {
"name": "bash-0:3.2-24.el5_6.1.i386",
"product_id": "bash-0:3.2-24.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-24.el5_6.1.i386",
"product": {
"name": "bash-debuginfo-0:3.2-24.el5_6.1.i386",
"product_id": "bash-debuginfo-0:3.2-24.el5_6.1.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.1?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-32.el5_9.2.i386",
"product": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.i386",
"product_id": "bash-debuginfo-0:3.2-32.el5_9.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-32.el5_9.2.i386",
"product": {
"name": "bash-0:3.2-32.el5_9.2.i386",
"product_id": "bash-0:3.2-32.el5_9.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.0-27.el4.2.i386",
"product": {
"name": "bash-debuginfo-0:3.0-27.el4.2.i386",
"product_id": "bash-debuginfo-0:3.0-27.el4.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.2?arch=i386"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.0-27.el4.2.i386",
"product": {
"name": "bash-0:3.0-27.el4.2.i386",
"product_id": "bash-0:3.0-27.el4.2.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.0-27.el4.2?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-0:3.2-24.el5_6.1.src",
"product": {
"name": "bash-0:3.2-24.el5_6.1.src",
"product_id": "bash-0:3.2-24.el5_6.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-32.el5_9.2.src",
"product": {
"name": "bash-0:3.2-32.el5_9.2.src",
"product_id": "bash-0:3.2-32.el5_9.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.2?arch=src"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_4.1.src",
"product": {
"name": "bash-0:4.1.2-15.el6_4.1.src",
"product_id": "bash-0:4.1.2-15.el6_4.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-9.el6_2.1.src",
"product": {
"name": "bash-0:4.1.2-9.el6_2.1.src",
"product_id": "bash-0:4.1.2-9.el6_2.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-9.el6_2.1?arch=src"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.0-27.el4.2.src",
"product": {
"name": "bash-0:3.0-27.el4.2.src",
"product_id": "bash-0:3.0-27.el4.2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.0-27.el4.2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-0:3.2-24.el5_6.1.x86_64",
"product": {
"name": "bash-0:3.2-24.el5_6.1.x86_64",
"product_id": "bash-0:3.2-24.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-24.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-24.el5_6.1.x86_64",
"product": {
"name": "bash-debuginfo-0:3.2-24.el5_6.1.x86_64",
"product_id": "bash-debuginfo-0:3.2-24.el5_6.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-24.el5_6.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-32.el5_9.2.x86_64",
"product": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.x86_64",
"product_id": "bash-debuginfo-0:3.2-32.el5_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-32.el5_9.2.x86_64",
"product": {
"name": "bash-0:3.2-32.el5_9.2.x86_64",
"product_id": "bash-0:3.2-32.el5_9.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"product_id": "bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_4.1.x86_64",
"product": {
"name": "bash-0:4.1.2-15.el6_4.1.x86_64",
"product_id": "bash-0:4.1.2-15.el6_4.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"product": {
"name": "bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"product_id": "bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-9.el6_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"product": {
"name": "bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"product_id": "bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-9.el6_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-9.el6_2.1.x86_64",
"product": {
"name": "bash-0:4.1.2-9.el6_2.1.x86_64",
"product_id": "bash-0:4.1.2-9.el6_2.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-9.el6_2.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:3.0-27.el4.2.x86_64",
"product": {
"name": "bash-debuginfo-0:3.0-27.el4.2.x86_64",
"product_id": "bash-debuginfo-0:3.0-27.el4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.0-27.el4.2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.0-27.el4.2.x86_64",
"product": {
"name": "bash-0:3.0-27.el4.2.x86_64",
"product_id": "bash-0:3.0-27.el4.2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.0-27.el4.2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-32.el5_9.2.s390x",
"product": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.s390x",
"product_id": "bash-debuginfo-0:3.2-32.el5_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-32.el5_9.2.s390x",
"product": {
"name": "bash-0:3.2-32.el5_9.2.s390x",
"product_id": "bash-0:3.2-32.el5_9.2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_4.1.s390x",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.s390x",
"product_id": "bash-doc-0:4.1.2-15.el6_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_4.1.s390x",
"product": {
"name": "bash-0:4.1.2-15.el6_4.1.s390x",
"product_id": "bash-0:4.1.2-15.el6_4.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-debuginfo-0:3.2-32.el5_9.2.ppc",
"product": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.ppc",
"product_id": "bash-debuginfo-0:3.2-32.el5_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@3.2-32.el5_9.2?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "bash-0:3.2-32.el5_9.2.ppc",
"product": {
"name": "bash-0:3.2-32.el5_9.2.ppc",
"product_id": "bash-0:3.2-32.el5_9.2.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@3.2-32.el5_9.2?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_4.1.i686",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.i686",
"product_id": "bash-doc-0:4.1.2-15.el6_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_4.1.i686",
"product": {
"name": "bash-0:4.1.2-15.el6_4.1.i686",
"product_id": "bash-0:4.1.2-15.el6_4.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"product": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"product_id": "bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-doc@4.1.2-15.el6_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"product": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"product_id": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash-debuginfo@4.1.2-15.el6_4.1?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "bash-0:4.1.2-15.el6_4.1.ppc64",
"product": {
"name": "bash-0:4.1.2-15.el6_4.1.ppc64",
"product_id": "bash-0:4.1.2-15.el6_4.1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bash@4.1.2-15.el6_4.1?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.0-27.el4.2.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)",
"product_id": "4AS-ELS:bash-0:3.0-27.el4.2.i386"
},
"product_reference": "bash-0:3.0-27.el4.2.i386",
"relates_to_product_reference": "4AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.0-27.el4.2.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)",
"product_id": "4AS-ELS:bash-0:3.0-27.el4.2.ia64"
},
"product_reference": "bash-0:3.0-27.el4.2.ia64",
"relates_to_product_reference": "4AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.0-27.el4.2.src as a component of Red Hat Enterprise Linux AS (v. 4 ELS)",
"product_id": "4AS-ELS:bash-0:3.0-27.el4.2.src"
},
"product_reference": "bash-0:3.0-27.el4.2.src",
"relates_to_product_reference": "4AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.0-27.el4.2.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)",
"product_id": "4AS-ELS:bash-0:3.0-27.el4.2.x86_64"
},
"product_reference": "bash-0:3.0-27.el4.2.x86_64",
"relates_to_product_reference": "4AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.0-27.el4.2.i386 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)",
"product_id": "4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.i386"
},
"product_reference": "bash-debuginfo-0:3.0-27.el4.2.i386",
"relates_to_product_reference": "4AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.0-27.el4.2.ia64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)",
"product_id": "4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.ia64"
},
"product_reference": "bash-debuginfo-0:3.0-27.el4.2.ia64",
"relates_to_product_reference": "4AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.0-27.el4.2.x86_64 as a component of Red Hat Enterprise Linux AS (v. 4 ELS)",
"product_id": "4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.x86_64"
},
"product_reference": "bash-debuginfo-0:3.0-27.el4.2.x86_64",
"relates_to_product_reference": "4AS-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.0-27.el4.2.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)",
"product_id": "4ES-ELS:bash-0:3.0-27.el4.2.i386"
},
"product_reference": "bash-0:3.0-27.el4.2.i386",
"relates_to_product_reference": "4ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.0-27.el4.2.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)",
"product_id": "4ES-ELS:bash-0:3.0-27.el4.2.ia64"
},
"product_reference": "bash-0:3.0-27.el4.2.ia64",
"relates_to_product_reference": "4ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.0-27.el4.2.src as a component of Red Hat Enterprise Linux ES (v. 4 ELS)",
"product_id": "4ES-ELS:bash-0:3.0-27.el4.2.src"
},
"product_reference": "bash-0:3.0-27.el4.2.src",
"relates_to_product_reference": "4ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.0-27.el4.2.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)",
"product_id": "4ES-ELS:bash-0:3.0-27.el4.2.x86_64"
},
"product_reference": "bash-0:3.0-27.el4.2.x86_64",
"relates_to_product_reference": "4ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.0-27.el4.2.i386 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)",
"product_id": "4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.i386"
},
"product_reference": "bash-debuginfo-0:3.0-27.el4.2.i386",
"relates_to_product_reference": "4ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.0-27.el4.2.ia64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)",
"product_id": "4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.ia64"
},
"product_reference": "bash-debuginfo-0:3.0-27.el4.2.ia64",
"relates_to_product_reference": "4ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.0-27.el4.2.x86_64 as a component of Red Hat Enterprise Linux ES (v. 4 ELS)",
"product_id": "4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.x86_64"
},
"product_reference": "bash-debuginfo-0:3.0-27.el4.2.x86_64",
"relates_to_product_reference": "4ES-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-24.el5_6.1.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.1.i386"
},
"product_reference": "bash-0:3.2-24.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-24.el5_6.1.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.1.ia64"
},
"product_reference": "bash-0:3.2-24.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-24.el5_6.1.src as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.1.src"
},
"product_reference": "bash-0:3.2-24.el5_6.1.src",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-24.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:bash-0:3.2-24.el5_6.1.x86_64"
},
"product_reference": "bash-0:3.2-24.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-24.el5_6.1.i386 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.i386"
},
"product_reference": "bash-debuginfo-0:3.2-24.el5_6.1.i386",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-24.el5_6.1.ia64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.ia64"
},
"product_reference": "bash-debuginfo-0:3.2-24.el5_6.1.ia64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-24.el5_6.1.x86_64 as a component of Red Hat Enterprise Linux Long Life (v. 5.6 server)",
"product_id": "5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.x86_64"
},
"product_reference": "bash-debuginfo-0:3.2-24.el5_6.1.x86_64",
"relates_to_product_reference": "5Server-5.6.LL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-32.el5_9.2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.i386"
},
"product_reference": "bash-0:3.2-32.el5_9.2.i386",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-32.el5_9.2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.ia64"
},
"product_reference": "bash-0:3.2-32.el5_9.2.ia64",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-32.el5_9.2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.ppc"
},
"product_reference": "bash-0:3.2-32.el5_9.2.ppc",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-32.el5_9.2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.s390x"
},
"product_reference": "bash-0:3.2-32.el5_9.2.s390x",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-32.el5_9.2.src as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.src"
},
"product_reference": "bash-0:3.2-32.el5_9.2.src",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:3.2-32.el5_9.2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.x86_64"
},
"product_reference": "bash-0:3.2-32.el5_9.2.x86_64",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.i386"
},
"product_reference": "bash-debuginfo-0:3.2-32.el5_9.2.i386",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.ia64"
},
"product_reference": "bash-debuginfo-0:3.2-32.el5_9.2.ia64",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.ppc"
},
"product_reference": "bash-debuginfo-0:3.2-32.el5_9.2.ppc",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.s390x"
},
"product_reference": "bash-debuginfo-0:3.2-32.el5_9.2.s390x",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:3.2-32.el5_9.2.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.9 server)",
"product_id": "5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.x86_64"
},
"product_reference": "bash-debuginfo-0:3.2-32.el5_9.2.x86_64",
"relates_to_product_reference": "5Server-5.9.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.src as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.src",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux HPC Node EUS (v. 6.4)",
"product_id": "6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6ComputeNode-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.src as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.src",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Compute Node Optional EUS (v. 6.4)",
"product_id": "6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6ComputeNode-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-9.el6_2.1.src as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.1.src"
},
"product_reference": "bash-0:4.1.2-9.el6_2.1.src",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-9.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.1.x86_64"
},
"product_reference": "bash-0:4.1.2-9.el6_2.1.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-9.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server AUS (v. 6.2)",
"product_id": "6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"relates_to_product_reference": "6Server-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.src as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.src",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server EUS (v. 6.4)",
"product_id": "6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6Server-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-9.el6_2.1.src as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.1.src"
},
"product_reference": "bash-0:4.1.2-9.el6_2.1.src",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-9.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.1.x86_64"
},
"product_reference": "bash-0:4.1.2-9.el6_2.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-9.el6_2.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional AUS (v. 6.2)",
"product_id": "6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.2.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.src as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.src",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.i686 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.i686",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.ppc64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.s390x as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.s390x",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-0:4.1.2-15.el6_4.1.x86_64 as a component of Red Hat Enterprise Linux Server Optional EUS (v. 6.4)",
"product_id": "6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64"
},
"product_reference": "bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"relates_to_product_reference": "6Server-optional-6.4.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-6271",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"discovery_date": "2014-09-12T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1141597"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the way Bash evaluated certain specially crafted environment variables. An attacker could use this flaw to override or bypass environment restrictions to execute shell commands. Certain services and applications allow remote unauthenticated attackers to provide environment variables, allowing them to exploit this issue.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "bash: specially-crafted environment variables can be used to inject shell commands",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS-ELS:bash-0:3.0-27.el4.2.i386",
"4AS-ELS:bash-0:3.0-27.el4.2.ia64",
"4AS-ELS:bash-0:3.0-27.el4.2.src",
"4AS-ELS:bash-0:3.0-27.el4.2.x86_64",
"4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.i386",
"4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.ia64",
"4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.x86_64",
"4ES-ELS:bash-0:3.0-27.el4.2.i386",
"4ES-ELS:bash-0:3.0-27.el4.2.ia64",
"4ES-ELS:bash-0:3.0-27.el4.2.src",
"4ES-ELS:bash-0:3.0-27.el4.2.x86_64",
"4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.i386",
"4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.ia64",
"4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.x86_64",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.i386",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.ia64",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.src",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.x86_64",
"5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.i386",
"5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.ia64",
"5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.x86_64",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.i386",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.ia64",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.ppc",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.s390x",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.src",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.x86_64",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.i386",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.ia64",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.ppc",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.s390x",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.x86_64",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.1.src",
"6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.1.x86_64",
"6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.1.src",
"6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.1.x86_64",
"6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2014-6271"
},
{
"category": "external",
"summary": "RHBZ#1141597",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"category": "external",
"summary": "RHSB-shellshock",
"url": "https://access.redhat.com/security/vulnerabilities/shellshock"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2014-6271",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271"
},
{
"category": "external",
"summary": "https://access.redhat.com/articles/1200223",
"url": "https://access.redhat.com/articles/1200223"
},
{
"category": "external",
"summary": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack",
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2014-09-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2014-09-24T14:18:45+00:00",
"details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the \nRed Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258",
"product_ids": [
"4AS-ELS:bash-0:3.0-27.el4.2.i386",
"4AS-ELS:bash-0:3.0-27.el4.2.ia64",
"4AS-ELS:bash-0:3.0-27.el4.2.src",
"4AS-ELS:bash-0:3.0-27.el4.2.x86_64",
"4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.i386",
"4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.ia64",
"4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.x86_64",
"4ES-ELS:bash-0:3.0-27.el4.2.i386",
"4ES-ELS:bash-0:3.0-27.el4.2.ia64",
"4ES-ELS:bash-0:3.0-27.el4.2.src",
"4ES-ELS:bash-0:3.0-27.el4.2.x86_64",
"4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.i386",
"4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.ia64",
"4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.x86_64",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.i386",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.ia64",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.src",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.x86_64",
"5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.i386",
"5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.ia64",
"5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.x86_64",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.i386",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.ia64",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.ppc",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.s390x",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.src",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.x86_64",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.i386",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.ia64",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.ppc",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.s390x",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.x86_64",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.1.src",
"6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.1.x86_64",
"6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.1.src",
"6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.1.x86_64",
"6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2014:1294"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"4AS-ELS:bash-0:3.0-27.el4.2.i386",
"4AS-ELS:bash-0:3.0-27.el4.2.ia64",
"4AS-ELS:bash-0:3.0-27.el4.2.src",
"4AS-ELS:bash-0:3.0-27.el4.2.x86_64",
"4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.i386",
"4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.ia64",
"4AS-ELS:bash-debuginfo-0:3.0-27.el4.2.x86_64",
"4ES-ELS:bash-0:3.0-27.el4.2.i386",
"4ES-ELS:bash-0:3.0-27.el4.2.ia64",
"4ES-ELS:bash-0:3.0-27.el4.2.src",
"4ES-ELS:bash-0:3.0-27.el4.2.x86_64",
"4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.i386",
"4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.ia64",
"4ES-ELS:bash-debuginfo-0:3.0-27.el4.2.x86_64",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.i386",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.ia64",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.src",
"5Server-5.6.LL:bash-0:3.2-24.el5_6.1.x86_64",
"5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.i386",
"5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.ia64",
"5Server-5.6.LL:bash-debuginfo-0:3.2-24.el5_6.1.x86_64",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.i386",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.ia64",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.ppc",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.s390x",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.src",
"5Server-5.9.EUS:bash-0:3.2-32.el5_9.2.x86_64",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.i386",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.ia64",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.ppc",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.s390x",
"5Server-5.9.EUS:bash-debuginfo-0:3.2-32.el5_9.2.x86_64",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6ComputeNode-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6ComputeNode-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6ComputeNode-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.1.src",
"6Server-6.2.AUS:bash-0:4.1.2-9.el6_2.1.x86_64",
"6Server-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"6Server-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6Server-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6Server-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6Server-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64",
"6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.1.src",
"6Server-optional-6.2.AUS:bash-0:4.1.2-9.el6_2.1.x86_64",
"6Server-optional-6.2.AUS:bash-debuginfo-0:4.1.2-9.el6_2.1.x86_64",
"6Server-optional-6.2.AUS:bash-doc-0:4.1.2-9.el6_2.1.x86_64",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.i686",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.ppc64",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.s390x",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.src",
"6Server-optional-6.4.EUS:bash-0:4.1.2-15.el6_4.1.x86_64",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.i686",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.ppc64",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.s390x",
"6Server-optional-6.4.EUS:bash-debuginfo-0:4.1.2-15.el6_4.1.x86_64",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.i686",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.ppc64",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.s390x",
"6Server-optional-6.4.EUS:bash-doc-0:4.1.2-15.el6_4.1.x86_64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2022-01-28T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Critical"
}
],
"title": "bash: specially-crafted environment variables can be used to inject shell commands"
}
]
}
GSD-2014-6271
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2014-6271",
"description": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"id": "GSD-2014-6271",
"references": [
"https://www.suse.com/security/cve/CVE-2014-6271.html",
"https://www.debian.org/security/2014/dsa-3032",
"https://access.redhat.com/errata/RHSA-2014:1354",
"https://access.redhat.com/errata/RHSA-2014:1295",
"https://access.redhat.com/errata/RHSA-2014:1294",
"https://access.redhat.com/errata/RHSA-2014:1293",
"https://ubuntu.com/security/CVE-2014-6271",
"https://advisories.mageia.org/CVE-2014-6271.html",
"https://alas.aws.amazon.com/cve/html/CVE-2014-6271.html",
"https://linux.oracle.com/cve/CVE-2014-6271.html",
"https://packetstormsecurity.com/files/cve/CVE-2014-6271"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2014-6271"
],
"details": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"id": "GSD-2014-6271",
"modified": "2023-12-13T01:22:50.745366Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cisa.gov": {
"cveID": "CVE-2014-6271",
"dateAdded": "2022-01-28",
"dueDate": "2022-07-28",
"product": "Bourne-Again Shell (Bash)",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute code.",
"vendorProject": "GNU",
"vulnerabilityName": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability"
},
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2014-6271",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "37816",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/37816/"
},
{
"name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html"
},
{
"name": "SUSE-SU-2014:1223",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
},
{
"name": "HPSBMU03165",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
},
{
"name": "SSRT101816",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"name": "39918",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/39918/"
},
{
"name": "HPSBHF03119",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2"
},
{
"name": "RHSA-2014:1295",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html"
},
{
"name": "openSUSE-SU-2014:1226",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html"
},
{
"name": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/",
"refsource": "CONFIRM",
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
},
{
"name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts",
"refsource": "CONFIRM",
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts"
},
{
"name": "HPSBST03131",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2"
},
{
"name": "SSRT101819",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded"
},
{
"name": "HPSBMU03245",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
},
{
"name": "HPSBST03196",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"name": "61188",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61188"
},
{
"name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
"refsource": "CONFIRM",
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
},
{
"name": "JVN#55667175",
"refsource": "JVN",
"url": "http://jvn.jp/en/jp/JVN55667175/index.html"
},
{
"name": "61676",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61676"
},
{
"name": "40619",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40619/"
},
{
"name": "openSUSE-SU-2014:1254",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html"
},
{
"name": "60433",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60433"
},
{
"name": "38849",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/38849/"
},
{
"name": "HPSBMU03143",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
},
{
"name": "HPSBMU03182",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"name": "SUSE-SU-2014:1260",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html"
},
{
"name": "HPSBST03155",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
},
{
"name": "61715",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61715"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
},
{
"name": "61816",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61816"
},
{
"name": "openSUSE-SU-2014:1310",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
},
{
"name": "61442",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61442"
},
{
"name": "HPSBMU03246",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
},
{
"name": "HPSBST03195",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2"
},
{
"name": "61283",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61283"
},
{
"name": "SSRT101711",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"name": "USN-2362-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/USN-2362-1"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085"
},
{
"name": "openSUSE-SU-2014:1308",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html"
},
{
"name": "61654",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61654"
},
{
"name": "61542",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61542"
},
{
"name": "http://www.novell.com/support/kb/doc.php?id=7015701",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/kb/doc.php?id=7015701"
},
{
"name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315",
"refsource": "CONFIRM",
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315"
},
{
"name": "62312",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62312"
},
{
"name": "59272",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59272"
},
{
"name": "HPSBST03122",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2"
},
{
"name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html",
"refsource": "CONFIRM",
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"name": "HPSBMU03217",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
},
{
"name": "SSRT101868",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "61703",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61703"
},
{
"name": "http://support.apple.com/kb/HT6495",
"refsource": "CONFIRM",
"url": "http://support.apple.com/kb/HT6495"
},
{
"name": "VU#252743",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"name": "61065",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61065"
},
{
"name": "SUSE-SU-2014:1213",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html"
},
{
"name": "HPSBST03129",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
},
{
"name": "HPSBMU03144",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
},
{
"name": "70103",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/70103"
},
{
"name": "JVNDB-2014-000126",
"refsource": "JVNDB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126"
},
{
"name": "SSRT101827",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"name": "TA14-268A",
"refsource": "CERT",
"url": "http://www.us-cert.gov/ncas/alerts/TA14-268A"
},
{
"name": "SUSE-SU-2014:1212",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html"
},
{
"name": "61641",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61641"
},
{
"name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648",
"refsource": "CONFIRM",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648"
},
{
"name": "https://access.redhat.com/node/1200223",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/node/1200223"
},
{
"name": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html"
},
{
"name": "SUSE-SU-2014:1287",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898"
},
{
"name": "APPLE-SA-2014-10-16-1",
"refsource": "APPLE",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
},
{
"name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"refsource": "FULLDISC",
"url": "http://seclists.org/fulldisclosure/2014/Oct/0"
},
{
"name": "MDVSA-2015:164",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164"
},
{
"name": "RHSA-2014:1293",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075"
},
{
"name": "openSUSE-SU-2014:1238",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html"
},
{
"name": "HPSBMU03220",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"name": "60325",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60325"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "60024",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60024"
},
{
"name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html"
},
{
"name": "34879",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/34879/"
},
{
"name": "https://access.redhat.com/articles/1200223",
"refsource": "CONFIRM",
"url": "https://access.redhat.com/articles/1200223"
},
{
"name": "62343",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62343"
},
{
"name": "61565",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61565"
},
{
"name": "https://www.suse.com/support/shellshock/",
"refsource": "CONFIRM",
"url": "https://www.suse.com/support/shellshock/"
},
{
"name": "HPSBST03157",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
},
{
"name": "61313",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61313"
},
{
"name": "SSRT101742",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"name": "61873",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61873"
},
{
"name": "61485",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61485"
},
{
"name": "60947",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60947"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183"
},
{
"name": "https://support.apple.com/kb/HT6535",
"refsource": "CONFIRM",
"url": "https://support.apple.com/kb/HT6535"
},
{
"name": "HPSBST03154",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
},
{
"name": "HPSBST03265",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272"
},
{
"name": "HPSBGN03142",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
},
{
"name": "61312",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61312"
},
{
"name": "60193",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60193"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html",
"refsource": "CONFIRM",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1294.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-1294.html"
},
{
"name": "60063",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60063"
},
{
"name": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html"
},
{
"name": "60034",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60034"
},
{
"name": "HPSBMU03133",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2"
},
{
"name": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html",
"refsource": "MISC",
"url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
},
{
"name": "59907",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59907"
},
{
"name": "58200",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/58200"
},
{
"name": "HPSBST03181",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
},
{
"name": "61643",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61643"
},
{
"name": "http://www.novell.com/support/kb/doc.php?id=7015721",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/kb/doc.php?id=7015721"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
},
{
"name": "61503",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61503"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
},
{
"name": "RHSA-2014:1354",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html"
},
{
"name": "40938",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/40938/"
},
{
"name": "HPSBGN03117",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2"
},
{
"name": "http://support.novell.com/security/cve/CVE-2014-6271.html",
"refsource": "CONFIRM",
"url": "http://support.novell.com/security/cve/CVE-2014-6271.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915"
},
{
"name": "61547",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61547"
},
{
"name": "HPSBHF03145",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
},
{
"name": "http://www.qnap.com/i/en/support/con_show.php?cid=61",
"refsource": "CONFIRM",
"url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
},
{
"name": "HPSBST03148",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2"
},
{
"name": "61552",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61552"
},
{
"name": "61780",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61780"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279"
},
{
"name": "https://support.citrix.com/article/CTX200223",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX200223"
},
{
"name": "DSA-3032",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447"
},
{
"name": "62228",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/62228"
},
{
"name": "HPSBGN03138",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
},
{
"name": "61855",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61855"
},
{
"name": "HPSBHF03124",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2"
},
{
"name": "60044",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60044"
},
{
"name": "61291",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61291"
},
{
"name": "RHSA-2014:1294",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html"
},
{
"name": "HPSBHF03125",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
},
{
"name": "59737",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/59737"
},
{
"name": "61287",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61287"
},
{
"name": "HPSBHF03146",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
},
{
"name": "HPSBGN03233",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"name": "SSRT101739",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "61711",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61711"
},
{
"name": "HPSBOV03228",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361"
},
{
"name": "HPSBGN03141",
"refsource": "HP",
"url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0388.html",
"refsource": "CONFIRM",
"url": "http://advisories.mageia.org/MGASA-2014-0388.html"
},
{
"name": "61128",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61128"
},
{
"name": "https://support.citrix.com/article/CTX200217",
"refsource": "CONFIRM",
"url": "https://support.citrix.com/article/CTX200217"
},
{
"name": "61471",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61471"
},
{
"name": "60055",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/60055"
},
{
"name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability",
"refsource": "CISCO",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash"
},
{
"name": "61550",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61550"
},
{
"name": "61633",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61633"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1293.html",
"refsource": "CONFIRM",
"url": "http://linux.oracle.com/errata/ELSA-2014-1293.html"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
},
{
"name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82",
"refsource": "CONFIRM",
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
},
{
"name": "61328",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61328"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
},
{
"name": "42938",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/42938/"
},
{
"name": "61129",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61129"
},
{
"name": "61700",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61700"
},
{
"name": "61603",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61603"
},
{
"name": "61857",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/61857"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879",
"refsource": "CONFIRM",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"name": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
},
{
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006",
"refsource": "MISC",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:3.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.05:b:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:4.0:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:3.2.48:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:bash:4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@debian.org",
"ID": "CVE-2014-6271"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/",
"refsource": "CONFIRM",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"name": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
},
{
"name": "RHSA-2014:1293",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html"
},
{
"name": "TA14-268A",
"refsource": "CERT",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/ncas/alerts/TA14-268A"
},
{
"name": "20140926 GNU Bash Environmental Variable Command Injection Vulnerability",
"refsource": "CISCO",
"tags": [
"Third Party Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash"
},
{
"name": "RHSA-2014:1294",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html"
},
{
"name": "DSA-3032",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"name": "RHSA-2014:1295",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html"
},
{
"name": "USN-2362-1",
"refsource": "UBUNTU",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2362-1"
},
{
"name": "VU#252743",
"refsource": "CERT-VN",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"name": "https://www.suse.com/support/shellshock/",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/support/shellshock/"
},
{
"name": "http://support.novell.com/security/cve/CVE-2014-6271.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.novell.com/security/cve/CVE-2014-6271.html"
},
{
"name": "61676",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61676"
},
{
"name": "http://www.novell.com/support/kb/doc.php?id=7015701",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015701"
},
{
"name": "https://kb.bluecoat.com/index?page=content\u0026id=SA82",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
},
{
"name": "http://support.apple.com/kb/HT6495",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT6495"
},
{
"name": "61641",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61641"
},
{
"name": "59737",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59737"
},
{
"name": "61700",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61700"
},
{
"name": "openSUSE-SU-2014:1238",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html"
},
{
"name": "SUSE-SU-2014:1223",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html"
},
{
"name": "HPSBGN03117",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2"
},
{
"name": "HPSBHF03119",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2"
},
{
"name": "openSUSE-SU-2014:1254",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html"
},
{
"name": "SUSE-SU-2014:1260",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html"
},
{
"name": "61485",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61485"
},
{
"name": "59907",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59907"
},
{
"name": "61654",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61654"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
},
{
"name": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html"
},
{
"name": "HPSBHF03124",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2"
},
{
"name": "http://www.novell.com/support/kb/doc.php?id=7015721",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015721"
},
{
"name": "61565",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61565"
},
{
"name": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html"
},
{
"name": "61643",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61643"
},
{
"name": "61503",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61503"
},
{
"name": "61711",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61711"
},
{
"name": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648"
},
{
"name": "61715",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61715"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
},
{
"name": "61633",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61633"
},
{
"name": "HPSBST03122",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2"
},
{
"name": "61552",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61552"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
},
{
"name": "61703",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61703"
},
{
"name": "20141001 FW: NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"refsource": "FULLDISC",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2014/Oct/0"
},
{
"name": "61283",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61283"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272"
},
{
"name": "61603",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61603"
},
{
"name": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html"
},
{
"name": "SUSE-SU-2014:1287",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
},
{
"name": "60947",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60947"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084"
},
{
"name": "https://support.apple.com/kb/HT6535",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT6535"
},
{
"name": "61188",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61188"
},
{
"name": "HPSBHF03125",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
},
{
"name": "APPLE-SA-2014-10-16-1",
"refsource": "APPLE",
"tags": [
"Third Party Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"name": "HPSBMU03133",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2"
},
{
"name": "HPSBGN03138",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
},
{
"name": "https://support.citrix.com/article/CTX200217",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX200217"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"name": "60034",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60034"
},
{
"name": "61816",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61816"
},
{
"name": "61128",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61128"
},
{
"name": "61313",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61313"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898"
},
{
"name": "61442",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61442"
},
{
"name": "61287",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61287"
},
{
"name": "https://support.citrix.com/article/CTX200223",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX200223"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279"
},
{
"name": "60055",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60055"
},
{
"name": "61129",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61129"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897"
},
{
"name": "61780",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61780"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
},
{
"name": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
},
{
"name": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"name": "61471",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61471"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915"
},
{
"name": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html"
},
{
"name": "58200",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/58200"
},
{
"name": "61328",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61328"
},
{
"name": "61857",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61857"
},
{
"name": "60193",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60193"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
},
{
"name": "61065",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61065"
},
{
"name": "61550",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61550"
},
{
"name": "61855",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61855"
},
{
"name": "60325",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60325"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
},
{
"name": "61312",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61312"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
},
{
"name": "60044",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60044"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361"
},
{
"name": "60024",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60024"
},
{
"name": "60063",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60063"
},
{
"name": "61291",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61291"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
},
{
"name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts"
},
{
"name": "60433",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60433"
},
{
"name": "HPSBGN03142",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
},
{
"name": "openSUSE-SU-2014:1310",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
},
{
"name": "JVN#55667175",
"refsource": "JVN",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN55667175/index.html"
},
{
"name": "HPSBST03131",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2"
},
{
"name": "http://www.qnap.com/i/en/support/con_show.php?cid=61",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
},
{
"name": "HPSBMU03143",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
},
{
"name": "openSUSE-SU-2014:1308",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html"
},
{
"name": "HPSBST03129",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
},
{
"name": "HPSBHF03146",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
},
{
"name": "HPSBGN03141",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
},
{
"name": "HPSBST03157",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
},
{
"name": "HPSBMU03144",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
},
{
"name": "JVNDB-2014-000126",
"refsource": "JVNDB",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126"
},
{
"name": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447"
},
{
"name": "openSUSE-SU-2014:1226",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html"
},
{
"name": "SUSE-SU-2014:1213",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html"
},
{
"name": "SUSE-SU-2014:1212",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html"
},
{
"name": "RHSA-2014:1354",
"refsource": "REDHAT",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html"
},
{
"name": "HPSBHF03145",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
},
{
"name": "61873",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61873"
},
{
"name": "HPSBST03181",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
},
{
"name": "HPSBST03155",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
},
{
"name": "HPSBST03154",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
},
{
"name": "HPSBMU03165",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
},
{
"name": "HPSBMU03182",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
},
{
"name": "HPSBST03148",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2"
},
{
"name": "62343",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62343"
},
{
"name": "62312",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62312"
},
{
"name": "HPSBMU03245",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"name": "HPSBMU03246",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
},
{
"name": "SSRT101711",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"name": "HPSBMU03217",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"name": "HPSBST03265",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2"
},
{
"name": "SSRT101868",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"name": "SSRT101819",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"name": "SSRT101816",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"name": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
},
{
"name": "HPSBST03195",
"refsource": "HP",
"tags": [
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2"
},
{
"name": "http://advisories.mageia.org/MGASA-2014-0388.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://advisories.mageia.org/MGASA-2014-0388.html"
},
{
"name": "MDVSA-2015:164",
"refsource": "MANDRIVA",
"tags": [
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164"
},
{
"name": "https://access.redhat.com/articles/1200223",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/articles/1200223"
},
{
"name": "39918",
"refsource": "EXPLOIT-DB",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/39918/"
},
{
"name": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html"
},
{
"name": "70103",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/70103"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085"
},
{
"name": "62228",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62228"
},
{
"name": "https://access.redhat.com/node/1200223",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/node/1200223"
},
{
"name": "61547",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61547"
},
{
"name": "61542",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61542"
},
{
"name": "59272",
"refsource": "SECUNIA",
"tags": [
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59272"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1294.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1294.html"
},
{
"name": "http://linux.oracle.com/errata/ELSA-2014-1293.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1293.html"
},
{
"name": "40938",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/40938/"
},
{
"name": "40619",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/40619/"
},
{
"name": "38849",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/38849/"
},
{
"name": "37816",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/37816/"
},
{
"name": "42938",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42938/"
},
{
"name": "34879",
"refsource": "EXPLOIT-DB",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/34879/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075"
},
{
"name": "20141001 NEW VMSA-2014-0010 - VMware product updates address critical Bash security vulnerabilities",
"refsource": "BUGTRAQ",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded"
},
{
"name": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"name": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
},
{
"name": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006",
"refsource": "MISC",
"tags": [],
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-11-17T22:15Z",
"publishedDate": "2014-09-24T18:48Z"
}
}
}
OPENSUSE-SU-2024:10106-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "bash-4.4-92.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the bash-4.4-92.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-10106",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10106-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-2524 page",
"url": "https://www.suse.com/security/cve/CVE-2014-2524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6271 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6277 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6277/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-6278 page",
"url": "https://www.suse.com/security/cve/CVE-2014-6278/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7169 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7169/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7186 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7186/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2014-7187 page",
"url": "https://www.suse.com/security/cve/CVE-2014-7187/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-9401 page",
"url": "https://www.suse.com/security/cve/CVE-2016-9401/"
}
],
"title": "bash-4.4-92.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:10106-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "bash-4.4-92.1.aarch64",
"product": {
"name": "bash-4.4-92.1.aarch64",
"product_id": "bash-4.4-92.1.aarch64"
}
},
{
"category": "product_version",
"name": "bash-devel-4.4-92.1.aarch64",
"product": {
"name": "bash-devel-4.4-92.1.aarch64",
"product_id": "bash-devel-4.4-92.1.aarch64"
}
},
{
"category": "product_version",
"name": "bash-doc-4.4-92.1.aarch64",
"product": {
"name": "bash-doc-4.4-92.1.aarch64",
"product_id": "bash-doc-4.4-92.1.aarch64"
}
},
{
"category": "product_version",
"name": "bash-lang-4.4-92.1.aarch64",
"product": {
"name": "bash-lang-4.4-92.1.aarch64",
"product_id": "bash-lang-4.4-92.1.aarch64"
}
},
{
"category": "product_version",
"name": "bash-loadables-4.4-92.1.aarch64",
"product": {
"name": "bash-loadables-4.4-92.1.aarch64",
"product_id": "bash-loadables-4.4-92.1.aarch64"
}
},
{
"category": "product_version",
"name": "libreadline7-7.0-92.1.aarch64",
"product": {
"name": "libreadline7-7.0-92.1.aarch64",
"product_id": "libreadline7-7.0-92.1.aarch64"
}
},
{
"category": "product_version",
"name": "libreadline7-32bit-7.0-92.1.aarch64",
"product": {
"name": "libreadline7-32bit-7.0-92.1.aarch64",
"product_id": "libreadline7-32bit-7.0-92.1.aarch64"
}
},
{
"category": "product_version",
"name": "readline-devel-7.0-92.1.aarch64",
"product": {
"name": "readline-devel-7.0-92.1.aarch64",
"product_id": "readline-devel-7.0-92.1.aarch64"
}
},
{
"category": "product_version",
"name": "readline-devel-32bit-7.0-92.1.aarch64",
"product": {
"name": "readline-devel-32bit-7.0-92.1.aarch64",
"product_id": "readline-devel-32bit-7.0-92.1.aarch64"
}
},
{
"category": "product_version",
"name": "readline-doc-7.0-92.1.aarch64",
"product": {
"name": "readline-doc-7.0-92.1.aarch64",
"product_id": "readline-doc-7.0-92.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-4.4-92.1.ppc64le",
"product": {
"name": "bash-4.4-92.1.ppc64le",
"product_id": "bash-4.4-92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bash-devel-4.4-92.1.ppc64le",
"product": {
"name": "bash-devel-4.4-92.1.ppc64le",
"product_id": "bash-devel-4.4-92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bash-doc-4.4-92.1.ppc64le",
"product": {
"name": "bash-doc-4.4-92.1.ppc64le",
"product_id": "bash-doc-4.4-92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bash-lang-4.4-92.1.ppc64le",
"product": {
"name": "bash-lang-4.4-92.1.ppc64le",
"product_id": "bash-lang-4.4-92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "bash-loadables-4.4-92.1.ppc64le",
"product": {
"name": "bash-loadables-4.4-92.1.ppc64le",
"product_id": "bash-loadables-4.4-92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libreadline7-7.0-92.1.ppc64le",
"product": {
"name": "libreadline7-7.0-92.1.ppc64le",
"product_id": "libreadline7-7.0-92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libreadline7-32bit-7.0-92.1.ppc64le",
"product": {
"name": "libreadline7-32bit-7.0-92.1.ppc64le",
"product_id": "libreadline7-32bit-7.0-92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "readline-devel-7.0-92.1.ppc64le",
"product": {
"name": "readline-devel-7.0-92.1.ppc64le",
"product_id": "readline-devel-7.0-92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "readline-devel-32bit-7.0-92.1.ppc64le",
"product": {
"name": "readline-devel-32bit-7.0-92.1.ppc64le",
"product_id": "readline-devel-32bit-7.0-92.1.ppc64le"
}
},
{
"category": "product_version",
"name": "readline-doc-7.0-92.1.ppc64le",
"product": {
"name": "readline-doc-7.0-92.1.ppc64le",
"product_id": "readline-doc-7.0-92.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-4.4-92.1.s390x",
"product": {
"name": "bash-4.4-92.1.s390x",
"product_id": "bash-4.4-92.1.s390x"
}
},
{
"category": "product_version",
"name": "bash-devel-4.4-92.1.s390x",
"product": {
"name": "bash-devel-4.4-92.1.s390x",
"product_id": "bash-devel-4.4-92.1.s390x"
}
},
{
"category": "product_version",
"name": "bash-doc-4.4-92.1.s390x",
"product": {
"name": "bash-doc-4.4-92.1.s390x",
"product_id": "bash-doc-4.4-92.1.s390x"
}
},
{
"category": "product_version",
"name": "bash-lang-4.4-92.1.s390x",
"product": {
"name": "bash-lang-4.4-92.1.s390x",
"product_id": "bash-lang-4.4-92.1.s390x"
}
},
{
"category": "product_version",
"name": "bash-loadables-4.4-92.1.s390x",
"product": {
"name": "bash-loadables-4.4-92.1.s390x",
"product_id": "bash-loadables-4.4-92.1.s390x"
}
},
{
"category": "product_version",
"name": "libreadline7-7.0-92.1.s390x",
"product": {
"name": "libreadline7-7.0-92.1.s390x",
"product_id": "libreadline7-7.0-92.1.s390x"
}
},
{
"category": "product_version",
"name": "libreadline7-32bit-7.0-92.1.s390x",
"product": {
"name": "libreadline7-32bit-7.0-92.1.s390x",
"product_id": "libreadline7-32bit-7.0-92.1.s390x"
}
},
{
"category": "product_version",
"name": "readline-devel-7.0-92.1.s390x",
"product": {
"name": "readline-devel-7.0-92.1.s390x",
"product_id": "readline-devel-7.0-92.1.s390x"
}
},
{
"category": "product_version",
"name": "readline-devel-32bit-7.0-92.1.s390x",
"product": {
"name": "readline-devel-32bit-7.0-92.1.s390x",
"product_id": "readline-devel-32bit-7.0-92.1.s390x"
}
},
{
"category": "product_version",
"name": "readline-doc-7.0-92.1.s390x",
"product": {
"name": "readline-doc-7.0-92.1.s390x",
"product_id": "readline-doc-7.0-92.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "bash-4.4-92.1.x86_64",
"product": {
"name": "bash-4.4-92.1.x86_64",
"product_id": "bash-4.4-92.1.x86_64"
}
},
{
"category": "product_version",
"name": "bash-devel-4.4-92.1.x86_64",
"product": {
"name": "bash-devel-4.4-92.1.x86_64",
"product_id": "bash-devel-4.4-92.1.x86_64"
}
},
{
"category": "product_version",
"name": "bash-doc-4.4-92.1.x86_64",
"product": {
"name": "bash-doc-4.4-92.1.x86_64",
"product_id": "bash-doc-4.4-92.1.x86_64"
}
},
{
"category": "product_version",
"name": "bash-lang-4.4-92.1.x86_64",
"product": {
"name": "bash-lang-4.4-92.1.x86_64",
"product_id": "bash-lang-4.4-92.1.x86_64"
}
},
{
"category": "product_version",
"name": "bash-loadables-4.4-92.1.x86_64",
"product": {
"name": "bash-loadables-4.4-92.1.x86_64",
"product_id": "bash-loadables-4.4-92.1.x86_64"
}
},
{
"category": "product_version",
"name": "libreadline7-7.0-92.1.x86_64",
"product": {
"name": "libreadline7-7.0-92.1.x86_64",
"product_id": "libreadline7-7.0-92.1.x86_64"
}
},
{
"category": "product_version",
"name": "libreadline7-32bit-7.0-92.1.x86_64",
"product": {
"name": "libreadline7-32bit-7.0-92.1.x86_64",
"product_id": "libreadline7-32bit-7.0-92.1.x86_64"
}
},
{
"category": "product_version",
"name": "readline-devel-7.0-92.1.x86_64",
"product": {
"name": "readline-devel-7.0-92.1.x86_64",
"product_id": "readline-devel-7.0-92.1.x86_64"
}
},
{
"category": "product_version",
"name": "readline-devel-32bit-7.0-92.1.x86_64",
"product": {
"name": "readline-devel-32bit-7.0-92.1.x86_64",
"product_id": "readline-devel-32bit-7.0-92.1.x86_64"
}
},
{
"category": "product_version",
"name": "readline-doc-7.0-92.1.x86_64",
"product": {
"name": "readline-doc-7.0-92.1.x86_64",
"product_id": "readline-doc-7.0-92.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-4.4-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-4.4-92.1.aarch64"
},
"product_reference": "bash-4.4-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-4.4-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-4.4-92.1.ppc64le"
},
"product_reference": "bash-4.4-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-4.4-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-4.4-92.1.s390x"
},
"product_reference": "bash-4.4-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-4.4-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-4.4-92.1.x86_64"
},
"product_reference": "bash-4.4-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-devel-4.4-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64"
},
"product_reference": "bash-devel-4.4-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-devel-4.4-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le"
},
"product_reference": "bash-devel-4.4-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-devel-4.4-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x"
},
"product_reference": "bash-devel-4.4-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-devel-4.4-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64"
},
"product_reference": "bash-devel-4.4-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-4.4-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64"
},
"product_reference": "bash-doc-4.4-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-4.4-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le"
},
"product_reference": "bash-doc-4.4-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-4.4-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x"
},
"product_reference": "bash-doc-4.4-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-doc-4.4-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64"
},
"product_reference": "bash-doc-4.4-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-lang-4.4-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64"
},
"product_reference": "bash-lang-4.4-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-lang-4.4-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le"
},
"product_reference": "bash-lang-4.4-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-lang-4.4-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x"
},
"product_reference": "bash-lang-4.4-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-lang-4.4-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64"
},
"product_reference": "bash-lang-4.4-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-loadables-4.4-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64"
},
"product_reference": "bash-loadables-4.4-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-loadables-4.4-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le"
},
"product_reference": "bash-loadables-4.4-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-loadables-4.4-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x"
},
"product_reference": "bash-loadables-4.4-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bash-loadables-4.4-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64"
},
"product_reference": "bash-loadables-4.4-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libreadline7-7.0-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64"
},
"product_reference": "libreadline7-7.0-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libreadline7-7.0-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le"
},
"product_reference": "libreadline7-7.0-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libreadline7-7.0-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x"
},
"product_reference": "libreadline7-7.0-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libreadline7-7.0-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64"
},
"product_reference": "libreadline7-7.0-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libreadline7-32bit-7.0-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64"
},
"product_reference": "libreadline7-32bit-7.0-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libreadline7-32bit-7.0-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le"
},
"product_reference": "libreadline7-32bit-7.0-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libreadline7-32bit-7.0-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x"
},
"product_reference": "libreadline7-32bit-7.0-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libreadline7-32bit-7.0-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64"
},
"product_reference": "libreadline7-32bit-7.0-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-devel-7.0-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64"
},
"product_reference": "readline-devel-7.0-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-devel-7.0-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le"
},
"product_reference": "readline-devel-7.0-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-devel-7.0-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x"
},
"product_reference": "readline-devel-7.0-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-devel-7.0-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64"
},
"product_reference": "readline-devel-7.0-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-devel-32bit-7.0-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64"
},
"product_reference": "readline-devel-32bit-7.0-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-devel-32bit-7.0-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le"
},
"product_reference": "readline-devel-32bit-7.0-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-devel-32bit-7.0-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x"
},
"product_reference": "readline-devel-32bit-7.0-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-devel-32bit-7.0-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64"
},
"product_reference": "readline-devel-32bit-7.0-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-doc-7.0-92.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64"
},
"product_reference": "readline-doc-7.0-92.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-doc-7.0-92.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le"
},
"product_reference": "readline-doc-7.0-92.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-doc-7.0-92.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x"
},
"product_reference": "readline-doc-7.0-92.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "readline-doc-7.0-92.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
},
"product_reference": "readline-doc-7.0-92.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2014-2524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-2524"
}
],
"notes": [
{
"category": "general",
"text": "The _rl_tropen function in util.c in GNU readline before 6.3 patch 3 allows local users to create or overwrite arbitrary files via a symlink attack on a /var/tmp/rltrace.[PID] file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-2524",
"url": "https://www.suse.com/security/cve/CVE-2014-2524"
},
{
"category": "external",
"summary": "SUSE Bug 868822 for CVE-2014-2524",
"url": "https://bugzilla.suse.com/868822"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2014-2524"
},
{
"cve": "CVE-2014-6271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6271"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6271",
"url": "https://www.suse.com/security/cve/CVE-2014-6271"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6271",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-6271"
},
{
"cve": "CVE-2014-6277",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6277"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6277",
"url": "https://www.suse.com/security/cve/CVE-2014-6277"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-6277",
"url": "https://bugzilla.suse.com/900454"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-6277"
},
{
"cve": "CVE-2014-6278",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-6278"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-6278",
"url": "https://www.suse.com/security/cve/CVE-2014-6278"
},
{
"category": "external",
"summary": "SUSE Bug 898604 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898604"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-6278",
"url": "https://bugzilla.suse.com/900127"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-6278"
},
{
"cve": "CVE-2014-7169",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7169"
}
],
"notes": [
{
"category": "general",
"text": "GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7169",
"url": "https://www.suse.com/security/cve/CVE-2014-7169"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 1130324 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/1130324"
},
{
"category": "external",
"summary": "SUSE Bug 870618 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/870618"
},
{
"category": "external",
"summary": "SUSE Bug 896776 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/896776"
},
{
"category": "external",
"summary": "SUSE Bug 898346 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898346"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899039"
},
{
"category": "external",
"summary": "SUSE Bug 899266 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/899266"
},
{
"category": "external",
"summary": "SUSE Bug 900127 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900127"
},
{
"category": "external",
"summary": "SUSE Bug 900454 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/900454"
},
{
"category": "external",
"summary": "SUSE Bug 902237 for CVE-2014-7169",
"url": "https://bugzilla.suse.com/902237"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2014-7169"
},
{
"cve": "CVE-2014-7186",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7186"
}
],
"notes": [
{
"category": "general",
"text": "The redirection implementation in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via crafted use of here documents, aka the \"redir_stack\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7186",
"url": "https://www.suse.com/security/cve/CVE-2014-7186"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7186",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 898603 for CVE-2014-7186",
"url": "https://bugzilla.suse.com/898603"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7186",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7186",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7186",
"url": "https://bugzilla.suse.com/899039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-7186"
},
{
"cve": "CVE-2014-7187",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2014-7187"
}
],
"notes": [
{
"category": "general",
"text": "Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the \"word_lineno\" issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2014-7187",
"url": "https://www.suse.com/security/cve/CVE-2014-7187"
},
{
"category": "external",
"summary": "SUSE Bug 1024628 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/1024628"
},
{
"category": "external",
"summary": "SUSE Bug 898603 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898603"
},
{
"category": "external",
"summary": "SUSE Bug 898762 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898762"
},
{
"category": "external",
"summary": "SUSE Bug 898812 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898812"
},
{
"category": "external",
"summary": "SUSE Bug 898884 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/898884"
},
{
"category": "external",
"summary": "SUSE Bug 899039 for CVE-2014-7187",
"url": "https://bugzilla.suse.com/899039"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2014-7187"
},
{
"cve": "CVE-2016-9401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-9401"
}
],
"notes": [
{
"category": "general",
"text": "popd in bash might allow local users to bypass the restricted shell and cause a use-after-free via a crafted address.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-9401",
"url": "https://www.suse.com/security/cve/CVE-2016-9401"
},
{
"category": "external",
"summary": "SUSE Bug 1010845 for CVE-2016-9401",
"url": "https://bugzilla.suse.com/1010845"
},
{
"category": "external",
"summary": "SUSE Bug 1044328 for CVE-2016-9401",
"url": "https://bugzilla.suse.com/1044328"
},
{
"category": "external",
"summary": "SUSE Bug 1123788 for CVE-2016-9401",
"url": "https://bugzilla.suse.com/1123788"
},
{
"category": "external",
"summary": "SUSE Bug 1159416 for CVE-2016-9401",
"url": "https://bugzilla.suse.com/1159416"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:bash-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-devel-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-doc-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-lang-4.4-92.1.x86_64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.aarch64",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.ppc64le",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.s390x",
"openSUSE Tumbleweed:bash-loadables-4.4-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.aarch64",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.s390x",
"openSUSE Tumbleweed:libreadline7-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-32bit-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-devel-7.0-92.1.x86_64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.aarch64",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.ppc64le",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.s390x",
"openSUSE Tumbleweed:readline-doc-7.0-92.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-9401"
}
]
}
FKIE_CVE-2014-6271
Vulnerability from fkie_nvd - Published: 2014-09-24 18:48 - Updated: 2025-10-22 01:159.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| security@debian.org | http://advisories.mageia.org/MGASA-2014-0388.html | Third Party Advisory | |
| security@debian.org | http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html | Broken Link, Third Party Advisory | |
| security@debian.org | http://jvn.jp/en/jp/JVN55667175/index.html | Vendor Advisory | |
| security@debian.org | http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 | Third Party Advisory, VDB Entry, Vendor Advisory | |
| security@debian.org | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 | Third Party Advisory | |
| security@debian.org | http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html | Exploit, Issue Tracking, Third Party Advisory | |
| security@debian.org | http://linux.oracle.com/errata/ELSA-2014-1293.html | Third Party Advisory | |
| security@debian.org | http://linux.oracle.com/errata/ELSA-2014-1294.html | Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141216207813411&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141216668515282&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141235957116749&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141319209015420&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141330425327438&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141330468527613&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141345648114150&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141383026420882&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141383081521087&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141383138121313&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141383196021590&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141383244821813&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141383304022067&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141383353622268&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141383465822787&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141450491804793&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141576728022234&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141577137423233&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141577241923505&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141577297623641&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141585637922673&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141694386919794&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=141879528318582&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=142113462216480&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=142118135300698&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=142358026505815&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=142358078406056&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=142546741516006&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=142719845423222&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=142721162228379&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://marc.info/?l=bugtraq&m=142805027510172&w=2 | Mailing List, Third Party Advisory | |
| security@debian.org | http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html | Third Party Advisory, VDB Entry | |
| security@debian.org | http://rhn.redhat.com/errata/RHSA-2014-1293.html | Third Party Advisory | |
| security@debian.org | http://rhn.redhat.com/errata/RHSA-2014-1294.html | Third Party Advisory | |
| security@debian.org | http://rhn.redhat.com/errata/RHSA-2014-1295.html | Third Party Advisory | |
| security@debian.org | http://rhn.redhat.com/errata/RHSA-2014-1354.html | Third Party Advisory | |
| security@debian.org | http://seclists.org/fulldisclosure/2014/Oct/0 | Mailing List, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/58200 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/59272 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/59737 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/59907 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/60024 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/60034 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/60044 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/60055 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/60063 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/60193 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/60325 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/60433 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/60947 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61065 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61128 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61129 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61188 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61283 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61287 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61291 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61312 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61313 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61328 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61442 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61471 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61485 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61503 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61542 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61547 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61550 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61552 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61565 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61603 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61633 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61641 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61643 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61654 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61676 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61700 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61703 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61711 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61715 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61780 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61816 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61855 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61857 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/61873 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/62228 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/62312 | Broken Link, Third Party Advisory | |
| security@debian.org | http://secunia.com/advisories/62343 | Broken Link, Third Party Advisory | |
| security@debian.org | http://support.apple.com/kb/HT6495 | Third Party Advisory | |
| security@debian.org | http://support.novell.com/security/cve/CVE-2014-6271.html | Third Party Advisory | |
| security@debian.org | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21685541 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21685604 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21685733 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21685749 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21685914 | Broken Link, Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21686084 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21686131 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21686246 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21686445 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21686447 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21686479 | Broken Link, Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21686494 | Third Party Advisory | |
| security@debian.org | http://www-01.ibm.com/support/docview.wss?uid=swg21687079 | Third Party Advisory | |
| security@debian.org | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 | Broken Link, Third Party Advisory | |
| security@debian.org | http://www.debian.org/security/2014/dsa-3032 | Mailing List, Third Party Advisory | |
| security@debian.org | http://www.kb.cert.org/vuls/id/252743 | Third Party Advisory, US Government Resource | |
| security@debian.org | http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 | Broken Link, Third Party Advisory | |
| security@debian.org | http://www.novell.com/support/kb/doc.php?id=7015701 | Third Party Advisory | |
| security@debian.org | http://www.novell.com/support/kb/doc.php?id=7015721 | Third Party Advisory | |
| security@debian.org | http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html | Third Party Advisory | |
| security@debian.org | http://www.qnap.com/i/en/support/con_show.php?cid=61 | Third Party Advisory | |
| security@debian.org | http://www.securityfocus.com/archive/1/533593/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
| security@debian.org | http://www.securityfocus.com/bid/70103 | Broken Link, Third Party Advisory, VDB Entry | |
| security@debian.org | http://www.ubuntu.com/usn/USN-2362-1 | Third Party Advisory | |
| security@debian.org | http://www.us-cert.gov/ncas/alerts/TA14-268A | Third Party Advisory, US Government Resource | |
| security@debian.org | http://www.vmware.com/security/advisories/VMSA-2014-0010.html | Third Party Advisory | |
| security@debian.org | http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 | Broken Link, Third Party Advisory | |
| security@debian.org | https://access.redhat.com/articles/1200223 | Exploit, Third Party Advisory | |
| security@debian.org | https://access.redhat.com/node/1200223 | Exploit, Third Party Advisory | |
| security@debian.org | https://bugzilla.redhat.com/show_bug.cgi?id=1141597 | Issue Tracking, Patch | |
| security@debian.org | https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes | Broken Link, Third Party Advisory | |
| security@debian.org | https://kb.bluecoat.com/index?page=content&id=SA82 | Broken Link, Third Party Advisory | |
| security@debian.org | https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 | Third Party Advisory | |
| security@debian.org | https://kc.mcafee.com/corporate/index?page=content&id=SB10085 | Broken Link, Third Party Advisory | |
| security@debian.org | https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/ | Exploit, Third Party Advisory | |
| security@debian.org | https://support.apple.com/kb/HT6535 | Third Party Advisory | |
| security@debian.org | https://support.citrix.com/article/CTX200217 | Third Party Advisory | |
| security@debian.org | https://support.citrix.com/article/CTX200223 | Permissions Required | |
| security@debian.org | https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html | Third Party Advisory | |
| security@debian.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075 | Third Party Advisory | |
| security@debian.org | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 | Broken Link, Third Party Advisory | |
| security@debian.org | https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts | Third Party Advisory | |
| security@debian.org | https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 | Third Party Advisory | |
| security@debian.org | https://www.exploit-db.com/exploits/34879/ | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | https://www.exploit-db.com/exploits/37816/ | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | https://www.exploit-db.com/exploits/38849/ | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | https://www.exploit-db.com/exploits/39918/ | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | https://www.exploit-db.com/exploits/40619/ | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | https://www.exploit-db.com/exploits/40938/ | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | https://www.exploit-db.com/exploits/42938/ | Exploit, Third Party Advisory, VDB Entry | |
| security@debian.org | https://www.suse.com/support/shellshock/ | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://advisories.mageia.org/MGASA-2014-0388.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvn.jp/en/jp/JVN55667175/index.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126 | Third Party Advisory, VDB Entry, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10673 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://linux.oracle.com/errata/ELSA-2014-1293.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://linux.oracle.com/errata/ELSA-2014-1294.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141216207813411&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141216668515282&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141235957116749&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141319209015420&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141330425327438&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141330468527613&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141345648114150&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141383026420882&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141383081521087&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141383138121313&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141383196021590&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141383244821813&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141383304022067&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141383353622268&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141383465822787&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141450491804793&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141576728022234&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141577137423233&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141577241923505&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141577297623641&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141585637922673&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141694386919794&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=141879528318582&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=142113462216480&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=142118135300698&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=142358026505815&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=142358078406056&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=142546741516006&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=142719845423222&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=142721162228379&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://marc.info/?l=bugtraq&m=142805027510172&w=2 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1293.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1294.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1295.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1354.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/fulldisclosure/2014/Oct/0 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/58200 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59272 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59737 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/59907 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60024 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60034 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60044 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60055 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60063 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60193 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60325 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60433 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/60947 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61065 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61128 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61129 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61188 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61283 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61287 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61291 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61312 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61313 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61328 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61442 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61471 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61485 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61503 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61542 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61547 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61550 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61552 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61565 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61603 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61633 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61641 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61643 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61654 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61676 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61700 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61703 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61711 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61715 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61780 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61816 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61855 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61857 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/61873 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62228 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62312 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/62343 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.apple.com/kb/HT6495 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://support.novell.com/security/cve/CVE-2014-6271.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21685541 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21685604 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21685733 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21685749 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21685914 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21686084 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21686131 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21686246 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21686445 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21686447 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21686479 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21686494 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21687079 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-3032 | Mailing List, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/252743 | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2015:164 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/support/kb/doc.php?id=7015701 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.novell.com/support/kb/doc.php?id=7015721 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.qnap.com/i/en/support/con_show.php?cid=61 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/533593/100/0/threaded | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/70103 | Broken Link, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/USN-2362-1 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.us-cert.gov/ncas/alerts/TA14-268A | Third Party Advisory, US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.vmware.com/security/advisories/VMSA-2014-0010.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/articles/1200223 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/node/1200223 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=1141597 | Issue Tracking, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.bluecoat.com/index?page=content&id=SA82 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kb.juniper.net/InfoCenter/index?page=content&id=JSA10648 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://kc.mcafee.com/corporate/index?page=content&id=SB10085 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/ | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.apple.com/kb/HT6535 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX200217 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.citrix.com/article/CTX200223 | Permissions Required | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04497075 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c04518183 | Broken Link, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk102673&src=securityAlerts | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/34879/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/37816/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/38849/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/39918/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40619/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/40938/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/42938/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.suse.com/support/shellshock/ | Third Party Advisory | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6271 |
| Vendor | Product | Version | |
|---|---|---|---|
| gnu | bash | * | |
| arista | eos | * | |
| arista | eos | * | |
| arista | eos | * | |
| arista | eos | * | |
| arista | eos | * | |
| arista | eos | * | |
| oracle | linux | 4 | |
| oracle | linux | 5 | |
| oracle | linux | 6 | |
| qnap | qts | * | |
| qnap | qts | 4.1.1 | |
| qnap | qts | 4.1.1 | |
| mageia | mageia | 3.0 | |
| mageia | mageia | 4.0 | |
| redhat | gluster_storage_server_for_on-premise | 2.1 | |
| redhat | virtualization | 3.4 | |
| redhat | enterprise_linux | 4.0 | |
| redhat | enterprise_linux | 5.0 | |
| redhat | enterprise_linux | 6.0 | |
| redhat | enterprise_linux | 7.0 | |
| redhat | enterprise_linux_desktop | 5.0 | |
| redhat | enterprise_linux_desktop | 6.0 | |
| redhat | enterprise_linux_desktop | 7.0 | |
| redhat | enterprise_linux_eus | 5.9 | |
| redhat | enterprise_linux_eus | 6.4 | |
| redhat | enterprise_linux_eus | 6.5 | |
| redhat | enterprise_linux_eus | 7.3 | |
| redhat | enterprise_linux_eus | 7.4 | |
| redhat | enterprise_linux_eus | 7.5 | |
| redhat | enterprise_linux_eus | 7.6 | |
| redhat | enterprise_linux_eus | 7.7 | |
| redhat | enterprise_linux_for_ibm_z_systems | 5.9_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems | 6.4_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems | 6.5_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems | 7.3_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems | 7.4_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems | 7.5_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems | 7.6_s390x | |
| redhat | enterprise_linux_for_ibm_z_systems | 7.7_s390x | |
| redhat | enterprise_linux_for_power_big_endian | 5.0_ppc | |
| redhat | enterprise_linux_for_power_big_endian | 5.9_ppc | |
| redhat | enterprise_linux_for_power_big_endian | 6.0_ppc64 | |
| redhat | enterprise_linux_for_power_big_endian | 6.4_ppc64 | |
| redhat | enterprise_linux_for_power_big_endian | 7.0_ppc64 | |
| redhat | enterprise_linux_for_power_big_endian_eus | 6.5_ppc64 | |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.3_ppc64 | |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.4_ppc64 | |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.5_ppc64 | |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.6_ppc64 | |
| redhat | enterprise_linux_for_power_big_endian_eus | 7.7_ppc64 | |
| redhat | enterprise_linux_for_scientific_computing | 6.0 | |
| redhat | enterprise_linux_for_scientific_computing | 7.0 | |
| redhat | enterprise_linux_server | 5.0 | |
| redhat | enterprise_linux_server | 6.0 | |
| redhat | enterprise_linux_server | 7.0 | |
| redhat | enterprise_linux_server_aus | 5.6 | |
| redhat | enterprise_linux_server_aus | 5.9 | |
| redhat | enterprise_linux_server_aus | 6.2 | |
| redhat | enterprise_linux_server_aus | 6.4 | |
| redhat | enterprise_linux_server_aus | 6.5 | |
| redhat | enterprise_linux_server_aus | 7.3 | |
| redhat | enterprise_linux_server_aus | 7.4 | |
| redhat | enterprise_linux_server_aus | 7.6 | |
| redhat | enterprise_linux_server_aus | 7.7 | |
| redhat | enterprise_linux_server_from_rhui | 5.0 | |
| redhat | enterprise_linux_server_from_rhui | 6.0 | |
| redhat | enterprise_linux_server_from_rhui | 7.0 | |
| redhat | enterprise_linux_server_tus | 6.5 | |
| redhat | enterprise_linux_server_tus | 7.3 | |
| redhat | enterprise_linux_server_tus | 7.6 | |
| redhat | enterprise_linux_server_tus | 7.7 | |
| redhat | enterprise_linux_workstation | 5.0 | |
| redhat | enterprise_linux_workstation | 6.0 | |
| redhat | enterprise_linux_workstation | 7.0 | |
| suse | studio_onsite | 1.3 | |
| opensuse | opensuse | 12.3 | |
| opensuse | opensuse | 13.1 | |
| opensuse | opensuse | 13.2 | |
| suse | linux_enterprise_desktop | 11 | |
| suse | linux_enterprise_desktop | 12 | |
| suse | linux_enterprise_server | 10 | |
| suse | linux_enterprise_server | 10 | |
| suse | linux_enterprise_server | 11 | |
| suse | linux_enterprise_server | 11 | |
| suse | linux_enterprise_server | 11 | |
| suse | linux_enterprise_server | 11 | |
| suse | linux_enterprise_server | 12 | |
| suse | linux_enterprise_software_development_kit | 11 | |
| suse | linux_enterprise_software_development_kit | 12 | |
| debian | debian_linux | 7.0 | |
| ibm | infosphere_guardium_database_activity_monitoring | 8.2 | |
| ibm | infosphere_guardium_database_activity_monitoring | 9.0 | |
| ibm | infosphere_guardium_database_activity_monitoring | 9.1 | |
| ibm | pureapplication_system | * | |
| ibm | pureapplication_system | * | |
| ibm | pureapplication_system | 2.0.0.0 | |
| ibm | qradar_risk_manager | 7.1.0 | |
| ibm | qradar_security_information_and_event_manager | 7.1.0 | |
| ibm | qradar_security_information_and_event_manager | 7.1.0 | |
| ibm | qradar_security_information_and_event_manager | 7.1.0 | |
| ibm | qradar_security_information_and_event_manager | 7.1.1 | |
| ibm | qradar_security_information_and_event_manager | 7.1.1 | |
| ibm | qradar_security_information_and_event_manager | 7.1.1 | |
| ibm | qradar_security_information_and_event_manager | 7.1.1 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.1.2 | |
| ibm | qradar_security_information_and_event_manager | 7.2 | |
| ibm | qradar_security_information_and_event_manager | 7.2.0 | |
| ibm | qradar_security_information_and_event_manager | 7.2.0 | |
| ibm | qradar_security_information_and_event_manager | 7.2.0 | |
| ibm | qradar_security_information_and_event_manager | 7.2.0 | |
| ibm | qradar_security_information_and_event_manager | 7.2.1 | |
| ibm | qradar_security_information_and_event_manager | 7.2.1 | |
| ibm | qradar_security_information_and_event_manager | 7.2.1 | |
| ibm | qradar_security_information_and_event_manager | 7.2.1 | |
| ibm | qradar_security_information_and_event_manager | 7.2.2 | |
| ibm | qradar_security_information_and_event_manager | 7.2.2 | |
| ibm | qradar_security_information_and_event_manager | 7.2.2 | |
| ibm | qradar_security_information_and_event_manager | 7.2.2 | |
| ibm | qradar_security_information_and_event_manager | 7.2.2 | |
| ibm | qradar_security_information_and_event_manager | 7.2.3 | |
| ibm | qradar_security_information_and_event_manager | 7.2.3 | |
| ibm | qradar_security_information_and_event_manager | 7.2.3 | |
| ibm | qradar_security_information_and_event_manager | 7.2.3 | |
| ibm | qradar_security_information_and_event_manager | 7.2.3 | |
| ibm | qradar_security_information_and_event_manager | 7.2.4 | |
| ibm | qradar_security_information_and_event_manager | 7.2.4 | |
| ibm | qradar_security_information_and_event_manager | 7.2.4 | |
| ibm | qradar_security_information_and_event_manager | 7.2.4 | |
| ibm | qradar_security_information_and_event_manager | 7.2.4 | |
| ibm | qradar_security_information_and_event_manager | 7.2.4 | |
| ibm | qradar_security_information_and_event_manager | 7.2.4 | |
| ibm | qradar_security_information_and_event_manager | 7.2.5 | |
| ibm | qradar_security_information_and_event_manager | 7.2.5 | |
| ibm | qradar_security_information_and_event_manager | 7.2.5 | |
| ibm | qradar_security_information_and_event_manager | 7.2.5 | |
| ibm | qradar_security_information_and_event_manager | 7.2.5 | |
| ibm | qradar_security_information_and_event_manager | 7.2.5 | |
| ibm | qradar_security_information_and_event_manager | 7.2.5 | |
| ibm | qradar_security_information_and_event_manager | 7.2.6 | |
| ibm | qradar_security_information_and_event_manager | 7.2.6 | |
| ibm | qradar_security_information_and_event_manager | 7.2.6 | |
| ibm | qradar_security_information_and_event_manager | 7.2.6 | |
| ibm | qradar_security_information_and_event_manager | 7.2.6 | |
| ibm | qradar_security_information_and_event_manager | 7.2.6 | |
| ibm | qradar_security_information_and_event_manager | 7.2.6 | |
| ibm | qradar_security_information_and_event_manager | 7.2.6 | |
| ibm | qradar_security_information_and_event_manager | 7.2.7 | |
| ibm | qradar_security_information_and_event_manager | 7.2.7 | |
| ibm | qradar_security_information_and_event_manager | 7.2.7 | |
| ibm | qradar_security_information_and_event_manager | 7.2.7 | |
| ibm | qradar_security_information_and_event_manager | 7.2.7 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8 | |
| ibm | qradar_security_information_and_event_manager | 7.2.8.15 | |
| ibm | qradar_security_information_and_event_manager | 7.2.9 | |
| ibm | qradar_vulnerability_manager | 7.2.0 | |
| ibm | qradar_vulnerability_manager | 7.2.1 | |
| ibm | qradar_vulnerability_manager | 7.2.2 | |
| ibm | qradar_vulnerability_manager | 7.2.3 | |
| ibm | qradar_vulnerability_manager | 7.2.4 | |
| ibm | qradar_vulnerability_manager | 7.2.6 | |
| ibm | qradar_vulnerability_manager | 7.2.6 | |
| ibm | qradar_vulnerability_manager | 7.2.6 | |
| ibm | qradar_vulnerability_manager | 7.2.6 | |
| ibm | qradar_vulnerability_manager | 7.2.6 | |
| ibm | qradar_vulnerability_manager | 7.2.6 | |
| ibm | qradar_vulnerability_manager | 7.2.6 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | qradar_vulnerability_manager | 7.2.8 | |
| ibm | smartcloud_entry_appliance | 2.3.0 | |
| ibm | smartcloud_entry_appliance | 2.4.0 | |
| ibm | smartcloud_entry_appliance | 3.1.0 | |
| ibm | smartcloud_entry_appliance | 3.2.0 | |
| ibm | smartcloud_provisioning | 2.1.0 | |
| ibm | software_defined_network_for_virtual_environments | * | |
| ibm | software_defined_network_for_virtual_environments | * | |
| ibm | software_defined_network_for_virtual_environments | * | |
| ibm | starter_kit_for_cloud | 2.2.0 | |
| ibm | workload_deployer | * | |
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.1 | |
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.2 | |
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.3 | |
| ibm | security_access_manager_for_mobile_8.0_firmware | 8.0.0.5 | |
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.1 | |
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.2 | |
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.3 | |
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.4 | |
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.5 | |
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.6 | |
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.7 | |
| ibm | security_access_manager_for_web_7.0_firmware | 7.0.0.8 | |
| ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.2 | |
| ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.3 | |
| ibm | security_access_manager_for_web_8.0_firmware | 8.0.0.5 | |
| ibm | storwize_v7000_firmware | * | |
| ibm | storwize_v7000_firmware | * | |
| ibm | storwize_v7000_firmware | * | |
| ibm | storwize_v7000_firmware | * | |
| ibm | storwize_v7000 | - | |
| ibm | storwize_v5000_firmware | * | |
| ibm | storwize_v5000_firmware | * | |
| ibm | storwize_v5000_firmware | * | |
| ibm | storwize_v5000 | - | |
| ibm | storwize_v3700_firmware | * | |
| ibm | storwize_v3700_firmware | * | |
| ibm | storwize_v3700_firmware | * | |
| ibm | storwize_v3700 | - | |
| ibm | storwize_v3500_firmware | * | |
| ibm | storwize_v3500_firmware | * | |
| ibm | storwize_v3500_firmware | * | |
| ibm | storwize_v3500 | - | |
| ibm | flex_system_v7000_firmware | * | |
| ibm | flex_system_v7000_firmware | * | |
| ibm | flex_system_v7000_firmware | * | |
| ibm | flex_system_v7000 | - | |
| ibm | san_volume_controller_firmware | * | |
| ibm | san_volume_controller_firmware | * | |
| ibm | san_volume_controller_firmware | * | |
| ibm | san_volume_controller | - | |
| ibm | stn6500_firmware | * | |
| ibm | stn6500_firmware | * | |
| ibm | stn6500_firmware | * | |
| ibm | stn6500 | - | |
| ibm | stn6800_firmware | * | |
| ibm | stn6800_firmware | * | |
| ibm | stn6800_firmware | * | |
| ibm | stn6800 | - | |
| ibm | stn7800_firmware | * | |
| ibm | stn7800_firmware | * | |
| ibm | stn7800_firmware | * | |
| ibm | stn7800 | - | |
| canonical | ubuntu_linux | 10.04 | |
| canonical | ubuntu_linux | 12.04 | |
| canonical | ubuntu_linux | 14.04 | |
| novell | zenworks_configuration_management | 10.3 | |
| novell | zenworks_configuration_management | 11 | |
| novell | zenworks_configuration_management | 11.1 | |
| novell | zenworks_configuration_management | 11.2 | |
| novell | zenworks_configuration_management | 11.3.0 | |
| novell | open_enterprise_server | 2.0 | |
| novell | open_enterprise_server | 11.0 | |
| checkpoint | security_gateway | * | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | * | |
| f5 | big-ip_access_policy_manager | 11.6.0 | |
| f5 | big-ip_advanced_firewall_manager | * | |
| f5 | big-ip_advanced_firewall_manager | 11.6.0 | |
| f5 | big-ip_analytics | * | |
| f5 | big-ip_analytics | 11.6.0 | |
| f5 | big-ip_application_acceleration_manager | * | |
| f5 | big-ip_application_acceleration_manager | 11.6.0 | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | * | |
| f5 | big-ip_application_security_manager | 11.6.0 | |
| f5 | big-ip_edge_gateway | * | |
| f5 | big-ip_edge_gateway | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | * | |
| f5 | big-ip_global_traffic_manager | 11.6.0 | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | * | |
| f5 | big-ip_link_controller | 11.6.0 | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | * | |
| f5 | big-ip_local_traffic_manager | 11.6.0 | |
| f5 | big-ip_policy_enforcement_manager | * | |
| f5 | big-ip_policy_enforcement_manager | 11.6.0 | |
| f5 | big-ip_protocol_security_module | * | |
| f5 | big-ip_protocol_security_module | * | |
| f5 | big-ip_wan_optimization_manager | * | |
| f5 | big-ip_wan_optimization_manager | * | |
| f5 | big-ip_webaccelerator | * | |
| f5 | big-ip_webaccelerator | * | |
| f5 | big-iq_cloud | * | |
| f5 | big-iq_device | * | |
| f5 | big-iq_security | * | |
| f5 | enterprise_manager | * | |
| f5 | enterprise_manager | * | |
| f5 | traffix_signaling_delivery_controller | * | |
| f5 | traffix_signaling_delivery_controller | 3.3.2 | |
| f5 | traffix_signaling_delivery_controller | 3.4.1 | |
| f5 | traffix_signaling_delivery_controller | 3.5.1 | |
| f5 | traffix_signaling_delivery_controller | 4.1.0 | |
| f5 | arx_firmware | * | |
| f5 | arx | - | |
| citrix | netscaler_sdx_firmware | * | |
| citrix | netscaler_sdx_firmware | * | |
| citrix | netscaler_sdx_firmware | * | |
| citrix | netscaler_sdx | - | |
| apple | mac_os_x | * | |
| vmware | vcenter_server_appliance | 5.0 | |
| vmware | vcenter_server_appliance | 5.0 | |
| vmware | vcenter_server_appliance | 5.0 | |
| vmware | vcenter_server_appliance | 5.1 | |
| vmware | vcenter_server_appliance | 5.1 | |
| vmware | vcenter_server_appliance | 5.1 | |
| vmware | vcenter_server_appliance | 5.5 | |
| vmware | vcenter_server_appliance | 5.5 | |
| vmware | esx | 4.0 | |
| vmware | esx | 4.1 |
{
"cisaActionDue": "2022-07-28",
"cisaExploitAdd": "2022-01-28",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "GNU Bourne-Again Shell (Bash) Arbitrary Code Execution Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4DBE402-1B0A-4854-ABE5-891321454C25",
"versionEndIncluding": "4.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DCA5A28D-79B6-4F3E-9C98-65D4DFAD8EE7",
"versionEndExcluding": "4.9.12",
"versionStartIncluding": "4.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9B1DC7EF-C994-4252-9DFE-DCA63FB17AE0",
"versionEndExcluding": "4.10.9",
"versionStartIncluding": "4.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9056776F-03F6-4C3D-8635-37D66FD16EAA",
"versionEndExcluding": "4.11.11",
"versionStartIncluding": "4.11.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AFEE6963-F73F-4B71-B4F8-6E550FBDA5F6",
"versionEndExcluding": "4.12.9",
"versionStartIncluding": "4.12.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8296875A-64FA-4592-848A-A923126BD8AF",
"versionEndExcluding": "4.13.9",
"versionStartIncluding": "4.13.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:arista:eos:*:*:*:*:*:*:*:*",
"matchCriteriaId": "816A16AF-1F5E-483A-AA89-3022818FAE43",
"versionEndExcluding": "4.14.4f",
"versionStartIncluding": "4.14.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:oracle:linux:4:*:*:*:*:*:*:*",
"matchCriteriaId": "F8421899-5D10-4C2B-88AA-3DA909FE3E67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:linux:5:-:*:*:*:*:*:*",
"matchCriteriaId": "62A2AC02-A933-4E51-810E-5D040B476B7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:oracle:linux:6:-:*:*:*:*:*:*",
"matchCriteriaId": "D7B037A8-72A6-4DFF-94B2-D688A5F6F876",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:qnap:qts:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BE8B7F1F-22F6-4B10-A6E5-DE44B1D2E649",
"versionEndExcluding": "4.1.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.1.1:-:*:*:*:*:*:*",
"matchCriteriaId": "F407EA72-BA1A-41A2-B699-874304A638A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:qnap:qts:4.1.1:build_0927:*:*:*:*:*:*",
"matchCriteriaId": "DDA25903-B334-438B-8196-B9E5119199D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:mageia:mageia:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "76F1E356-E019-47E8-AA5F-702DA93CF74E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:mageia:mageia:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F805A106-9A6F-48E7-8582-D3C5A26DFC11",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:gluster_storage_server_for_on-premise:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EC489F35-07F1-4C3E-80B9-78F0689BC54B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:redhat:virtualization:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "95CE35FC-266F-4025-A0B8-FB853C020800",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6172AF57-B26D-45F8-BE3A-F75ABDF28F49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D8B549B-E57B-4DFE-8A13-CAB06B5356B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2F6AB192-9D7D-4A9A-8995-E53A9DE9EAFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133AAFA7-AF42-4D7B-8822-AA2E85611BF5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6252E88C-27FF-420D-A64A-C34124CF7E6A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A8E07B7-3739-4BEB-88F8-C7F62431E889",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "569964DA-31BE-4520-A66D-C3B09D557AB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:5.9_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "EC5537E1-1E8E-49C5-B4CB-A8E2EE3F5088",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.4_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "804DFF9F-BAA8-4239-835B-6182471A224F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:6.5_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "9EE496C0-35F7-44DC-B3F0-71EA3A613C38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.3_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "71179893-49F2-433C-A7AC-687075F9CC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.4_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "1D4C43D8-02A5-4385-A89E-F265FEEC9E9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.5_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "37ECC029-3D84-4DD7-B28B-E5AD5559CF94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.6_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CBED2A-B6B0-420E-BC40-160930D8662E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:7.7_s390x:*:*:*:*:*:*:*",
"matchCriteriaId": "652F7BB0-A6EA-45D0-86D4-49F4CA6C3EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.0_ppc:*:*:*:*:*:*:*",
"matchCriteriaId": "29BBF1AC-F31F-4251-8054-0D89A8E6E990",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:5.9_ppc:*:*:*:*:*:*:*",
"matchCriteriaId": "C52A4A2F-6385-4E5F-B2C7-0EF7267546F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.0_ppc64:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8D654F-2442-4EA0-AF89-6AC2CD214772",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:6.4_ppc64:*:*:*:*:*:*:*",
"matchCriteriaId": "D8ED0658-5F8F-48F0-A605-A2205DA27DA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian:7.0_ppc64:*:*:*:*:*:*:*",
"matchCriteriaId": "8BCF87FD-9358-42A5-9917-25DF0180A5A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:6.5_ppc64:*:*:*:*:*:*:*",
"matchCriteriaId": "C385DA76-4863-4D39-84D2-9D185D322365",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.3_ppc64:*:*:*:*:*:*:*",
"matchCriteriaId": "188019BF-3700-4B3F-BFA5-553B2B545B7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.4_ppc64:*:*:*:*:*:*:*",
"matchCriteriaId": "9B8B2E32-B838-4E51-BAA2-764089D2A684",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.5_ppc64:*:*:*:*:*:*:*",
"matchCriteriaId": "4319B943-7B19-468D-A160-5895F7F997A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.6_ppc64:*:*:*:*:*:*:*",
"matchCriteriaId": "39C1ABF5-4070-4AA7-BAB8-4F63E1BD91FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_power_big_endian_eus:7.7_ppc64:*:*:*:*:*:*:*",
"matchCriteriaId": "8036E2AE-4E44-4FA5-AFFB-A3724BFDD654",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "634C23AC-AC9C-43F4-BED8-1C720816D5E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_for_scientific_computing:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "37CE1DC7-72C5-483C-8921-0B462C8284D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "54D669D4-6D7E-449D-80C1-28FA44F06FFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "BB6ADFB8-210D-4E46-82A2-1C8705928382",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AD6D0378-F0F4-4AAA-80AF-8287C790EC96",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8821E5FE-319D-40AB-A515-D56C1893E6F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0AE981D4-0CA1-46FA-8E91-E1A4D5B31383",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_from_rhui:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F732C7C9-A9CC-4DEF-A8BE-D0F18C944C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "835AE071-CEAE-49E5-8F0C-E5F50FB85EFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*",
"matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*",
"matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D0AC5CD5-6E58-433C-9EB3-6DFE5656463E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:suse:studio_onsite:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "74BCA435-7594-49E8-9BAE-9E02E129B6C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DFBF430B-0832-44B0-AA0E-BA9E467F7668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A10BC294-9196-425F-9FB0-B1625465B47F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "03117DF1-3BEC-4B8D-AD63-DBBDB2126081",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:11:sp3:*:*:*:*:*:*",
"matchCriteriaId": "3ED68ADD-BBDA-4485-BC76-58F011D72311",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_desktop:12:-:*:*:*:*:*:*",
"matchCriteriaId": "D2DF4815-B8CB-4AD3-B91D-2E09A8E318E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp3:*:*:ltss:*:*:*",
"matchCriteriaId": "CED02712-1031-4206-AC4D-E68710F46EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:10:sp4:*:*:ltss:*:*:*",
"matchCriteriaId": "35BBD83D-BDC7-4678-BE94-639F59281139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp1:*:*:ltss:-:*:*",
"matchCriteriaId": "7F4AF9EC-7C74-40C3-A1BA-82B80C4A7EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp2:*:*:ltss:*:*:*",
"matchCriteriaId": "CB6476C7-03F2-4939-AB85-69AA524516D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:-:*:*",
"matchCriteriaId": "E534C201-BCC5-473C-AAA7-AAB97CEB5437",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:11:sp3:*:*:*:vmware:*:*",
"matchCriteriaId": "2470C6E8-2024-4CF5-9982-CFF50E88EAE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*",
"matchCriteriaId": "15FC9014-BD85-4382-9D04-C0703E901D7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:11:sp3:*:*:*:*:*:*",
"matchCriteriaId": "2F7F8866-DEAD-44D1-AB10-21EE611AA026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:suse:linux_enterprise_software_development_kit:12:-:*:*:*:*:*:*",
"matchCriteriaId": "1831D45A-EE6E-4220-8F8C-248B69520948",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "94C9C346-6DEC-4C72-9F59-BB3BEC42B551",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2071DABB-7102-47F2-A15F-A6C03607D01F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:infosphere_guardium_database_activity_monitoring:9.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A8661E86-E075-427F-8E05-7A33811A3A76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BEFCC35D-1C83-4CA5-8B1D-9A637613AD7E",
"versionEndIncluding": "1.0.0.4",
"versionStartIncluding": "1.0.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:pureapplication_system:*:*:*:*:*:*:*:*",
"matchCriteriaId": "054736AF-96E0-491D-B824-CC4A35B76E14",
"versionEndIncluding": "1.1.0.4",
"versionStartIncluding": "1.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:pureapplication_system:2.0.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "575894EE-F13C-4D56-8B63-59A379F63BD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_risk_manager:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0E476AEB-AD38-4033-8426-DC502497D75A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3C062C89-5DC2-46EE-A9D3-23E7539A5DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr1:*:*:*:*:*:*",
"matchCriteriaId": "20981443-6A64-4852-B2CB-3299927C6F78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.0:mr2:*:*:*:*:*:*",
"matchCriteriaId": "59761BB8-FCC7-4D15-88A8-82076CCF196F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:-:*:*:*:*:*:*",
"matchCriteriaId": "CF399B2E-8413-4B80-A0C0-E61E8A0A8604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "230EBA53-66AF-432B-B4C1-08D8FC903B2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "789F398A-5CB2-48F8-AF8F-05BF0A8E04B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.1:p3:*:*:*:*:*:*",
"matchCriteriaId": "EF102659-B067-473E-AA37-EA90A82D1864",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:-:*:*:*:*:*:*",
"matchCriteriaId": "81DF915D-D764-4C21-B213-0ADFD844E9DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p1:*:*:*:*:*:*",
"matchCriteriaId": "C29A4119-A992-4713-85D6-4FDED7CD416A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p10:*:*:*:*:*:*",
"matchCriteriaId": "4CA59C9D-74C2-4AFC-B1D1-1BC305FD493B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p11:*:*:*:*:*:*",
"matchCriteriaId": "5720A37E-1DB5-45BA-9FDE-0EAEFE1F2257",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p12:*:*:*:*:*:*",
"matchCriteriaId": "F03006B7-037B-491F-A09F-DEB2FF076754",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p13:*:*:*:*:*:*",
"matchCriteriaId": "FE78AED4-AD60-406C-82E0-BA52701B49BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p2:*:*:*:*:*:*",
"matchCriteriaId": "3D0B71F0-CCED-4E23-989A-3E9E2D71307C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p3:*:*:*:*:*:*",
"matchCriteriaId": "5CF8FC22-C556-451C-B928-F5AF8DF4BF45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p4:*:*:*:*:*:*",
"matchCriteriaId": "081D3B14-45F6-4F96-944B-94D967FEFA26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p5:*:*:*:*:*:*",
"matchCriteriaId": "DE2C36B5-43F8-401B-B420-1FA5F13A4D6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p6:*:*:*:*:*:*",
"matchCriteriaId": "D922DC5A-63F6-4188-BCDE-BB987402E47E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p7:*:*:*:*:*:*",
"matchCriteriaId": "BFD5737C-AAE8-4C8D-BCFE-FFDF5DA4221C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p8:*:*:*:*:*:*",
"matchCriteriaId": "C2BCC22C-A32B-4945-AFBC-777DBE248FB8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.1.2:p9:*:*:*:*:*:*",
"matchCriteriaId": "92F92890-63B0-4918-A147-8852B6E2FA8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8016ECD3-4417-47A8-9493-C9F9EDF5FAA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:-:*:*:*:*:*:*",
"matchCriteriaId": "ED0B143A-5386-4375-AEB2-48619B2B1EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p1:*:*:*:*:*:*",
"matchCriteriaId": "E7ECA734-9E95-484F-B880-2491A0E2531B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p2:*:*:*:*:*:*",
"matchCriteriaId": "5D7CD9E9-033C-44B8-A68C-47AC260873E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.0:p3:*:*:*:*:*:*",
"matchCriteriaId": "07B660DC-A94F-48F0-A2F4-1C39CC4751A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:-:*:*:*:*:*:*",
"matchCriteriaId": "44D355AE-A8C0-4D7B-87FE-5D4138B6BB2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p1:*:*:*:*:*:*",
"matchCriteriaId": "329C8551-98D1-4255-B598-9E75A071C186",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p2:*:*:*:*:*:*",
"matchCriteriaId": "FD0687B7-F374-4368-AD9E-041123B23A6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.1:p3:*:*:*:*:*:*",
"matchCriteriaId": "D0330E77-454E-4E77-9628-50681B748491",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:-:*:*:*:*:*:*",
"matchCriteriaId": "3863726E-15AD-4A47-85CB-0C9965E76EF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p1:*:*:*:*:*:*",
"matchCriteriaId": "5C07D9DC-E6C1-4FB0-86F1-144FD51B08CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p2:*:*:*:*:*:*",
"matchCriteriaId": "3105129C-8FE8-4BF0-8CB9-A7F3F7FE1107",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p3:*:*:*:*:*:*",
"matchCriteriaId": "D1F35447-889F-4CE9-9473-87046B4707EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.2:p4:*:*:*:*:*:*",
"matchCriteriaId": "A3A5DFC0-BBD7-430C-A026-E1F34E08894D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:-:*:*:*:*:*:*",
"matchCriteriaId": "141E8F6A-3998-4F22-A717-3F52BC998F97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p1:*:*:*:*:*:*",
"matchCriteriaId": "F09AA197-BB55-4CF0-AC29-4449C07DE510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p2:*:*:*:*:*:*",
"matchCriteriaId": "3E468E33-B183-4830-97E2-EAF9FD3758E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p3:*:*:*:*:*:*",
"matchCriteriaId": "738C8F2B-3D3E-4E1F-977A-05D3A39F115D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.3:p4:*:*:*:*:*:*",
"matchCriteriaId": "1ED03E83-909B-423F-81F2-34AB7F24BBE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:-:*:*:*:*:*:*",
"matchCriteriaId": "9778E8AA-A034-4B04-A42E-6A182378C7DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p1:*:*:*:*:*:*",
"matchCriteriaId": "AEE15598-4064-4E31-86BA-7851AA4B76C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p2:*:*:*:*:*:*",
"matchCriteriaId": "59FE3789-FB47-4939-B9AA-86D203445526",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p3:*:*:*:*:*:*",
"matchCriteriaId": "2F96389A-82B9-42DE-8E93-D2B2EE610F7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p4:*:*:*:*:*:*",
"matchCriteriaId": "3131CDA5-1C4D-489C-8788-FA396F8ADB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p5:*:*:*:*:*:*",
"matchCriteriaId": "DCC7DF3E-658C-41D7-A4AC-433440A02092",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.4:p6:*:*:*:*:*:*",
"matchCriteriaId": "EEBB12B8-4EF6-42B9-9D28-A9CA129B0FBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:-:*:*:*:*:*:*",
"matchCriteriaId": "279C30FB-EA1C-4D1D-A37E-F1EEF79F19F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p1:*:*:*:*:*:*",
"matchCriteriaId": "D6870C1E-E4A4-4666-89DB-D72C8100D27E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p2:*:*:*:*:*:*",
"matchCriteriaId": "BE183CA0-FFBB-4746-8BBE-5D1910DD2100",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p3:*:*:*:*:*:*",
"matchCriteriaId": "D04B5EBF-C94C-4A44-9A7E-75623CAF832C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p4:*:*:*:*:*:*",
"matchCriteriaId": "5723FDF4-198B-488E-B075-F528EC6E4D18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p5:*:*:*:*:*:*",
"matchCriteriaId": "7E23A972-5BCA-4C7E-B6F9-AD54992861A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.5:p6:*:*:*:*:*:*",
"matchCriteriaId": "1D00AFC9-8A9C-4BB1-9E60-BC6D552DC8E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:-:*:*:*:*:*:*",
"matchCriteriaId": "BFE4D0FF-6445-4E14-9536-ADB32662B346",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p1:*:*:*:*:*:*",
"matchCriteriaId": "C7FC4FDA-1C8D-4D7A-B5EA-D905FA830805",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p2:*:*:*:*:*:*",
"matchCriteriaId": "753AA0F3-09F4-4E34-8E72-FAFD8BFE18EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p3:*:*:*:*:*:*",
"matchCriteriaId": "9AC763FD-C143-4CA3-9A24-D50C9ED243D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p4:*:*:*:*:*:*",
"matchCriteriaId": "299C6CBE-905F-4E59-AF2F-89A1CD767916",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p5:*:*:*:*:*:*",
"matchCriteriaId": "78538461-1B7E-4712-AA8D-D2EA3477635B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p6:*:*:*:*:*:*",
"matchCriteriaId": "E3FF46F1-EF19-49D7-9EDD-44441C1A3F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.6:p7:*:*:*:*:*:*",
"matchCriteriaId": "D9F91FB6-7D8F-4D89-B6BA-2C6DF15B9A51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:-:*:*:*:*:*:*",
"matchCriteriaId": "5725106C-A650-4C24-9636-1200BD44CCA4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p1:*:*:*:*:*:*",
"matchCriteriaId": "F1501425-96F7-487B-9588-FDA2DAC3790A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p2:*:*:*:*:*:*",
"matchCriteriaId": "48D95998-9434-4AFF-9983-0D7AC34176A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p3:*:*:*:*:*:*",
"matchCriteriaId": "D60BB309-860D-4D74-B08F-F94AFE84C881",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.7:p4:*:*:*:*:*:*",
"matchCriteriaId": "F63E864E-6323-41B4-956F-51F9364DFAE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:-:*:*:*:*:*:*",
"matchCriteriaId": "EC724282-7431-465E-8E60-4037121B8838",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p1:*:*:*:*:*:*",
"matchCriteriaId": "73151221-C102-4425-9316-1EE4CAAB6531",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p10:*:*:*:*:*:*",
"matchCriteriaId": "D1E9DDCD-6D22-4175-94EF-D8A5457E7355",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p11:*:*:*:*:*:*",
"matchCriteriaId": "35AB906F-43CD-4D54-8274-1FD551532E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p12:*:*:*:*:*:*",
"matchCriteriaId": "1ADC75F0-B27E-4B15-B829-482FBA0063A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p13:*:*:*:*:*:*",
"matchCriteriaId": "D015D670-8AEA-49A3-8D22-9E3009322EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p14:*:*:*:*:*:*",
"matchCriteriaId": "C18F3CC3-9BCF-4DE8-B7CA-59587D5E61F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p15:*:*:*:*:*:*",
"matchCriteriaId": "E543BC0F-ADFB-4CF2-BC6C-90DC76BE3A95",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p16:*:*:*:*:*:*",
"matchCriteriaId": "28CE650B-BE03-4EDF-BE27-2FA6657F7A52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p2:*:*:*:*:*:*",
"matchCriteriaId": "2356A4E6-561B-40CA-8348-B30D581B1E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p3:*:*:*:*:*:*",
"matchCriteriaId": "74509F3F-840E-48B8-88B1-EA4FFB90ACC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p4:*:*:*:*:*:*",
"matchCriteriaId": "BE7BD528-628F-4CA9-9FE8-8A79BDC97680",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p5:*:*:*:*:*:*",
"matchCriteriaId": "26118C2B-78CC-4038-9DEA-7A9417029790",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p6:*:*:*:*:*:*",
"matchCriteriaId": "29EBC1DD-6949-4B12-8CA5-EE2BCDB8C4C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p7:*:*:*:*:*:*",
"matchCriteriaId": "4F445D93-D482-4A74-810D-66D78CBCAFED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p8:*:*:*:*:*:*",
"matchCriteriaId": "2C9F200C-ECC9-4D51-AFE7-E99C16D09148",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8:p9:*:*:*:*:*:*",
"matchCriteriaId": "56B87CB5-0F77-4040-BB58-9DBF5723A4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.8.15:*:*:*:*:*:*:*",
"matchCriteriaId": "F4B3321B-11AD-43EB-867C-FA4FA6A5421E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DFB104CA-55CD-4B9E-A2F7-CC06E57663CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4975223D-9E31-4CEC-A4B6-C0996828B855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "22E0F4A7-B8BD-42D1-92DB-2B510FFC9C36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C15C820B-4778-4B8F-8BD8-E996F1D4062D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A42E70EE-2E23-4D92-ADE0-9177B9EDD430",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "01C91446-4A36-4FCE-A973-3E6F813FABC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p1:*:*:*:*:*:*",
"matchCriteriaId": "58281E62-E350-4B0D-9322-8BA1E1773CB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p2:*:*:*:*:*:*",
"matchCriteriaId": "BF1A152E-5795-4319-BD4D-855DE19C744C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p3:*:*:*:*:*:*",
"matchCriteriaId": "438FCE7F-035A-4D89-96FE-EE5278C85493",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p4:*:*:*:*:*:*",
"matchCriteriaId": "80900F2C-7CFA-4C40-A6B5-51E12C3DA187",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p5:*:*:*:*:*:*",
"matchCriteriaId": "DDE9A060-1D4D-46E5-A34F-CC4CFA260D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p6:*:*:*:*:*:*",
"matchCriteriaId": "33F900E6-AE47-4789-A337-70C6BEF22895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.6:p7:*:*:*:*:*:*",
"matchCriteriaId": "AD2E5054-2151-414D-A88F-6697FF280D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:-:*:*:*:*:*:*",
"matchCriteriaId": "3EB09361-372E-4F51-B255-C7D2DB41969F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p1:*:*:*:*:*:*",
"matchCriteriaId": "A36D6991-3728-4F60-A443-37652DFAA053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p10:*:*:*:*:*:*",
"matchCriteriaId": "4142CC4E-9F0D-4017-8D17-D59FBCEB36F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p11:*:*:*:*:*:*",
"matchCriteriaId": "63C0F7CA-5F3C-41D4-AAD6-084643115D85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p12:*:*:*:*:*:*",
"matchCriteriaId": "1D16C66D-15BF-4EB8-8D78-DF12A69BD7F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p13:*:*:*:*:*:*",
"matchCriteriaId": "81C388DC-0941-4D08-8C1C-BD43D9B0DC8F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p14:*:*:*:*:*:*",
"matchCriteriaId": "45CD14D8-665A-46C5-8387-33FF266822A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p15:*:*:*:*:*:*",
"matchCriteriaId": "D510329D-B39E-4E2B-AAEC-1FDA7869C9E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p16:*:*:*:*:*:*",
"matchCriteriaId": "4640FE06-4D22-442E-A0E0-76EEFAF6ECB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p17:*:*:*:*:*:*",
"matchCriteriaId": "6A846C69-CA94-4F5E-9E02-69EA6680549E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p2:*:*:*:*:*:*",
"matchCriteriaId": "F3E63ECF-25CB-4E7F-BF51-B4D7B3541AE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p3:*:*:*:*:*:*",
"matchCriteriaId": "FF14DD4F-6779-4B17-AB1B-D4DE58E7E231",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p4:*:*:*:*:*:*",
"matchCriteriaId": "7AAEE176-631A-41B9-BC40-93F866DA9D5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p5:*:*:*:*:*:*",
"matchCriteriaId": "75C963D5-F2D1-49EE-93B5-CA7FE7EAB98C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p6:*:*:*:*:*:*",
"matchCriteriaId": "9388D932-9818-4A68-9543-B0643166DB2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p7:*:*:*:*:*:*",
"matchCriteriaId": "770A9287-C910-4690-9402-0C0B7BAC8912",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p8:*:*:*:*:*:*",
"matchCriteriaId": "3F8AC068-D5AC-4042-8A7C-5B95EA0E85F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:qradar_vulnerability_manager:7.2.8:p9:*:*:*:*:*:*",
"matchCriteriaId": "B503F1F7-F439-420D-B465-9A51CCECAB06",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:smartcloud_entry_appliance:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "27948B08-C452-41FB-B41F-6ADB3AAE087E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:smartcloud_entry_appliance:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8AB8FB4C-5BBC-420D-84F0-C8424DC25CD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:smartcloud_entry_appliance:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CAF1F14C-DB2C-40A8-B899-C127C7ECC0D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:smartcloud_entry_appliance:3.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E87FA9CC-D201-430F-8FE6-8C9A88CEAB1C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:smartcloud_provisioning:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4D7F2743-71BB-4011-B919-7E8032B6B72F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:kvm:*:*:*",
"matchCriteriaId": "3738FAC6-B90B-4014-9E86-17ED6D19D23D",
"versionEndExcluding": "1.2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:openflow:*:*:*",
"matchCriteriaId": "35B6634E-4F09-423C-87E7-59D4127CC023",
"versionEndExcluding": "1.2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:software_defined_network_for_virtual_environments:*:*:*:*:vmware:*:*:*",
"matchCriteriaId": "0A7A7100-A1DA-4191-A4C1-D930829A3DC2",
"versionEndExcluding": "1.2.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:starter_kit_for_cloud:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "83739ED7-37F1-4712-8C81-E56F58790240",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ibm:workload_deployer:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CDD227E-1F98-4F73-BB65-3820F39127F0",
"versionEndIncluding": "3.1.0.7",
"versionStartIncluding": "3.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA4B8E11-83D3-4B38-90B6-4C0F536D06B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "AFD6FF12-A3AD-4D2B-92EB-44D20AF4DD9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD7C3FED-3B2F-4EC9-9A9B-05EFDB0AA56B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_mobile_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "250AF7A4-8DDF-427C-8BF7-788667908D77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "22433CE0-9772-48CE-8069-612FF3732C21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2569AA28-5C61-4BBD-A501-E1ACFA36837B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79AFD6BE-4ED1-4A9C-AF30-F083A7A4F418",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "3AB188A2-D7CE-4141-A55A-C074C84E366E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DE776097-1DA4-4F27-8E96-61E3D9FFE8D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4E5283-0FEE-4F37-9C41-FA695063FF79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "39D9B9CF-5F3D-4CA3-87A0-AAE1BA5F09C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_7.0_firmware:7.0.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "73EB6121-62CD-49FC-A1D2-5467B007253C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "97E19969-DD73-42F2-9E91-504E1663B268",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F9CC2E05-5179-4241-A710-E582510EEB0D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:security_access_manager_for_web_8.0_firmware:8.0.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "BD1366C8-9C78-4B40-8E40-19C4DFEC2B1D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3CB18F38-AC6A-406A-A4DD-40688B803744",
"versionEndExcluding": "1.4.3.5",
"versionStartIncluding": "1.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DFE781C8-40F7-4F6D-8FED-8EB3071FE9DB",
"versionEndExcluding": "1.5.0.4",
"versionStartIncluding": "1.5.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A5AB3395-B458-49F8-A8E3-25FF0C1C3BD3",
"versionEndExcluding": "7.2.0.9",
"versionStartIncluding": "7.2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC57FAE-AD4D-4C9F-97A4-581C977B5FE4",
"versionEndExcluding": "7.3.0.7",
"versionStartIncluding": "7.3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2ED020-4C7B-4303-ABE6-74D46D127556",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "47A17EE0-7D3E-4CD7-984C-BB17BF6F4BFD",
"versionEndExcluding": "7.1.0.11",
"versionStartIncluding": "1.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "33A46CF2-392A-4BB9-B4BF-DE8C5228CAAE",
"versionEndExcluding": "7.2.0.9",
"versionStartIncluding": "7.2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v5000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9C4EF774-BD92-444D-9583-25DB97CDA4F3",
"versionEndExcluding": "7.3.0.7",
"versionStartIncluding": "7.3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v5000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0B69C8D-32A4-449F-9BFC-F1587C7FA8BD",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8753BBDB-A858-4A51-A8FD-8DF8DF2734A0",
"versionEndExcluding": "7.1.0.11",
"versionStartIncluding": "1.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0FB9850A-3308-4277-A68C-AD418612101E",
"versionEndExcluding": "7.2.0.9",
"versionStartIncluding": "7.2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3700_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C84D7A48-6745-49D3-AE52-31DD7EEC0D61",
"versionEndExcluding": "7.3.0.7",
"versionStartIncluding": "7.3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v3700:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49318A1D-49F6-4CA7-AE31-0EB4B3790CBB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1A3A3E-5636-4422-9B7B-B3D97989E674",
"versionEndExcluding": "7.1.0.11",
"versionStartIncluding": "1.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7384B993-049F-48D7-86D6-FE221C783245",
"versionEndExcluding": "7.2.0.9",
"versionStartIncluding": "7.2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:storwize_v3500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B1DF6129-9CEA-4812-800F-A6FD5095D60E",
"versionEndExcluding": "7.3.0.7",
"versionStartIncluding": "7.3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:storwize_v3500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7352FACE-C8D0-49A7-A2D7-B755599F0FB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79788A89-4152-4B4B-BFF0-518D90EE4D2B",
"versionEndExcluding": "7.1.0.11",
"versionStartIncluding": "1.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "680738C5-63D5-4F60-9610-FD0D87FCBBCA",
"versionEndExcluding": "7.2.0.9",
"versionStartIncluding": "7.2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:flex_system_v7000_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "872E2102-6BE6-42B6-93B0-942B7DABCBDA",
"versionEndExcluding": "7.3.0.7",
"versionStartIncluding": "7.3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:flex_system_v7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DACA26CF-7C3F-4215-B032-ED9C5EFD57D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E6E31991-DF33-4F00-8430-7B626E8174CE",
"versionEndExcluding": "7.1.0.11",
"versionStartIncluding": "1.1.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B2E25BB0-6F5A-4A7B-9147-D4E17014C747",
"versionEndExcluding": "7.2.0.9",
"versionStartIncluding": "7.2.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:san_volume_controller_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B80C1675-4948-45DC-B593-EDB1354E42F3",
"versionEndExcluding": "7.3.0.7",
"versionStartIncluding": "7.3.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:san_volume_controller:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5D84487-CEBA-48A0-9B15-A0300D992E3D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1CE69F8D-5EEE-4BC7-939C-CE71BCD2E11D",
"versionEndExcluding": "3.8.0.07",
"versionStartIncluding": "3.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BDEC166F-A967-4616-B9EF-503054EFD197",
"versionEndExcluding": "3.9.1.08",
"versionStartIncluding": "3.9.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:stn6500_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "713E71BC-16F5-41E3-9816-74D5E8D8C9A9",
"versionEndExcluding": "4.1.2.06",
"versionStartIncluding": "4.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:stn6500:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D2487E0-046C-476F-BFF4-EF77D9E856D8",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0287F3CD-2151-491D-8BC3-6D3921BE8FFA",
"versionEndExcluding": "3.8.0.07",
"versionStartIncluding": "3.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C4179899-87B4-42C3-8245-9A34EC04F6A1",
"versionEndExcluding": "3.9.1.08",
"versionStartIncluding": "3.9.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:stn6800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B8CED766-9742-4037-8005-F0BDDE9176DD",
"versionEndExcluding": "4.1.2.06",
"versionStartIncluding": "4.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:stn6800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C41EEAEC-08AE-4478-8977-5A4D7B48C175",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "298C961D-5E5F-4277-B192-A4C29243BECC",
"versionEndExcluding": "3.8.0.07",
"versionStartIncluding": "3.8.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E5A76C40-BA90-4FBD-8DFF-4AF8F952963A",
"versionEndExcluding": "3.9.1.08",
"versionStartIncluding": "3.9.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:ibm:stn7800_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B0663FBC-01C0-4AD8-A0B8-6097E537D352",
"versionEndExcluding": "4.1.2.06",
"versionStartIncluding": "4.1.2.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:ibm:stn7800:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CE145DE3-3C9B-4949-B6D4-9B259372CCE0",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:*",
"matchCriteriaId": "01EDA41C-6B2E-49AF-B503-EB3882265C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*",
"matchCriteriaId": "CB66DB75-2B16-4EBF-9B93-CE49D8086E41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*",
"matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0ABC25E5-76CD-469B-879A-B1F7109D0181",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*",
"matchCriteriaId": "98942F6C-330F-459A-B2B4-72572DB4070E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "F5A92B0C-7256-45F0-8E0C-ADFEF36CF43D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "8C0BAB94-6521-4B57-9E56-A57BA5E20C24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:novell:zenworks_configuration_management:11.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "3A7788E5-93B9-4149-8823-2ACBA5CF17E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:novell:open_enterprise_server:2.0:sp3:*:*:*:linux_kernel:*:*",
"matchCriteriaId": "B41B4ECD-6F30-46F5-A559-1CEFC7964873",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:novell:open_enterprise_server:11.0:sp2:*:*:*:linux_kernel:*:*",
"matchCriteriaId": "D42ADCD9-1455-401C-B94F-D367A78A2B97",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkpoint:security_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2853A787-E5F1-4455-9482-7C538B80556C",
"versionEndExcluding": "r77.30",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "79618AB4-7A8E-4488-8608-57EC2F8681FE",
"versionEndIncluding": "10.2.4",
"versionStartIncluding": "10.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E910D60-1145-4229-9890-80D2D67C3845",
"versionEndIncluding": "11.5.1",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_access_policy_manager:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CFA77C6B-72DB-4D57-87CF-11F2C7EDB828",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48BBEF73-E87D-467F-85EB-47BE212DF0E8",
"versionEndIncluding": "11.5.1",
"versionStartIncluding": "11.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B276E4DF-69FC-4158-B93A-781A45605034",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EE23220D-E364-41B7-A440-43B3AA4A716A",
"versionEndIncluding": "11.5.1",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_analytics:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "B70D2BD5-8E3F-4B57-84EF-3AF40F6378F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C483253F-841E-4D4E-9B4A-932E9D07268B",
"versionEndIncluding": "11.5.1",
"versionStartIncluding": "11.4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_acceleration_manager:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B40837-EC2B-41FB-ACC3-806054EAF28C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "667D3780-3949-41AC-83DE-5BCB8B36C382",
"versionEndIncluding": "10.2.4",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4F0E7766-BDB4-42AB-B6CC-6B4E86A10038",
"versionEndIncluding": "11.5.1",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_application_security_manager:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "475F0EF8-42CB-4099-9C4A-390F946C4924",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8347412-DC42-4B86-BF6E-A44A5E1541ED",
"versionEndIncluding": "10.2.4",
"versionStartIncluding": "10.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C8942D9D-8E3A-4876-8E93-ED8D201FF546",
"versionEndIncluding": "11.3.0",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7B5AF8C8-578E-4FD7-8BAA-53A57EE4C653",
"versionEndIncluding": "10.2.4",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "06BA93C0-A7AE-4A8E-BD74-08149A204463",
"versionEndIncluding": "11.5.1",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_global_traffic_manager:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D7D7863D-B064-4D7A-A66B-C3D3523425FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1DF6BB8A-FA63-4DBC-891C-256FF23CBCF0",
"versionEndIncluding": "10.2.4",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3E0D8F52-0EAD-4E02-A8D8-CBAE2CDC703B",
"versionEndIncluding": "11.5.1",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_link_controller:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5CDEC701-DAB3-4D92-AA67-B886E6693E46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "289CEABB-22A2-436D-AE4B-4BDA2D0EAFDB",
"versionEndIncluding": "10.2.4",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C6D61BF2-69D8-4AD2-85CD-D87F640A6888",
"versionEndIncluding": "11.5.1",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_local_traffic_manager:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2FF5A5F6-4BA3-4276-8679-B5560EACF2E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E9A06D61-E6CB-4A8A-B06D-9FEA1812C167",
"versionEndIncluding": "11.5.1",
"versionStartIncluding": "11.3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:11.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CB8D3B87-B8F5-490A-B1D9-04F2EE93EEA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2C0B4C01-C71E-4E35-B63A-68395984E033",
"versionEndIncluding": "10.2.4",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_protocol_security_module:*:*:*:*:*:*:*:*",
"matchCriteriaId": "9828CBA5-BB72-46E2-987D-633A5B3E2AFF",
"versionEndIncluding": "11.4.1",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BB60C39D-52ED-47DD-9FB9-2B4BC8D9F8AC",
"versionEndIncluding": "10.2.4",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_wan_optimization_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "68BC025A-D45E-45FB-A4E4-1C89320B5BBE",
"versionEndIncluding": "11.3.0",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AE007A64-5867-4B1A-AEFB-3AB2CD6A5EA4",
"versionEndIncluding": "10.2.4",
"versionStartIncluding": "10.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C75978B-566B-4353-8716-099CB8790EE0",
"versionEndIncluding": "11.3.0",
"versionStartIncluding": "11.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-iq_cloud:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC24B891-6DBA-4C02-B4CF-8D1CA53B4B74",
"versionEndIncluding": "4.4.0",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-iq_device:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0BB0FDAC-C49D-4E63-ACA9-7BAD7C93A5D2",
"versionEndIncluding": "4.4.0",
"versionStartIncluding": "4.2.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:big-iq_security:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3AEB1FC5-1179-4DE9-99A2-D650167A7A60",
"versionEndIncluding": "4.4.0",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0ADD1B04-9F78-40B3-8314-6935277073B0",
"versionEndIncluding": "2.3.0",
"versionStartIncluding": "2.1.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:enterprise_manager:*:*:*:*:*:*:*:*",
"matchCriteriaId": "482E630B-93A1-4B9B-8273-821C116ADC4F",
"versionEndIncluding": "3.1.1",
"versionStartIncluding": "3.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1343FBDC-4BF0-403B-B257-96672F092263",
"versionEndIncluding": "4.0.5",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C138527-73D3-4AEE-BFAB-1D240A585A0F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F2EB3D6-EF4C-4241-A31E-3990664004A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "8F0CD8F8-26CE-43F0-87EB-A08F1D1EDB25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1D1168D2-93D5-4415-A666-B4BE0B2AC201",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:f5:arx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "48A2FBA9-207F-4F16-932D-BF0BA3440503",
"versionEndIncluding": "6.4.0",
"versionStartIncluding": "6.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:f5:arx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4C6AC80F-9D91-468D-BEE3-6A0759723673",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FF1DB4B7-AFCC-4D56-95BA-C66AB7A36680",
"versionEndExcluding": "9.3.67.5r1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "665EF643-3CDC-4518-9693-0D49F0870283",
"versionEndExcluding": "10.1.129.11r1",
"versionStartIncluding": "10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:citrix:netscaler_sdx_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE3CC45-49E5-40DE-B5C3-52A754A9C599",
"versionEndExcluding": "10.5.52.11r1",
"versionStartIncluding": "10.5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:citrix:netscaler_sdx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8968E39A-1E16-4B7F-A16A-190EBC20D04F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*",
"matchCriteriaId": "864B5480-704F-4636-A938-7D95AD4223AD",
"versionEndExcluding": "10.10.0",
"versionStartIncluding": "10.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "35D34345-0AD1-499C-9A74-982B2D3F305A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "3DF3F07E-6F4E-4B97-B313-7DA3E8A88451",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.0:update_2:*:*:*:*:*:*",
"matchCriteriaId": "5C98B0EA-7A52-4BDF-90C2-38797FC2B75A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FECF06B5-3915-48F0-A140-41C7A27EE99D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_1:*:*:*:*:*:*",
"matchCriteriaId": "BBD8B161-0A07-492F-89E4-7A0BD02F6464",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.1:update_2:*:*:*:*:*:*",
"matchCriteriaId": "F3E8E0E1-FF63-425D-8C22-86B16CFB7B1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "29DF8DD7-B5CC-4152-A726-1D48459068D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server_appliance:5.5:update_1:*:*:*:*:*:*",
"matchCriteriaId": "DB2E2AAD-E221-4227-A41B-DC01BFDFCD6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "BC337BB7-9A45-4406-A783-851F279130EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix."
},
{
"lang": "es",
"value": "GNU Bash hasta la versi\u00f3n 4.3 procesa cadenas finales despu\u00e9s de las definiciones de funciones en los valores de variables de entorno, lo que permite a atacantes remotos ejecutar c\u00f3digo arbitrario a trav\u00e9s de un entorno manipulado, tal como se ha demostrado por vectores que involucran la caracter\u00edstica ForceCommand en sshd OpenSSH, los m\u00f3dulos mod_cgi y mod_cgid en el Apache HTTP Server, scripts ejecutados por clientes DHCP no especificados, y otras situaciones en las cuales el ajuste de entorno ocurre a trav\u00e9s de un l\u00edmite privilegiado de la ejecuci\u00f3n de Bash, tambi\u00e9n conocido como \"ShellShock.\" NOTA: la reparaci\u00f3n original para este problema era incorrecta; CVE-2014-7169 ha sido asignada para cubrir la vulnerabilidad que todav\u00eda est\u00e1 presente despu\u00e9s de la soluci\u00f3n incorrecta."
}
],
"id": "CVE-2014-6271",
"lastModified": "2025-10-22T01:15:57.643",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2014-09-24T18:48:04.477",
"references": [
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://advisories.mageia.org/MGASA-2014-0388.html"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"source": "security@debian.org",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN55667175/index.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1293.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1294.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2014/Oct/0"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/58200"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59272"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59737"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59907"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60024"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60034"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60044"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60055"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60063"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60193"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60325"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60433"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60947"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61065"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61128"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61129"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61188"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61283"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61287"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61291"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61312"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61313"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61328"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61442"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61471"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61485"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61503"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61542"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61547"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61550"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61552"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61565"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61603"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61633"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61641"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61643"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61654"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61676"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61700"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61703"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61711"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61715"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61780"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61816"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61855"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61857"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61873"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62228"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62312"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62343"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT6495"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://support.novell.com/security/cve/CVE-2014-6271.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315"
},
{
"source": "security@debian.org",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015701"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015721"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/70103"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2362-1"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/ncas/alerts/TA14-268A"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://access.redhat.com/articles/1200223"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://access.redhat.com/node/1200223"
},
{
"source": "security@debian.org",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT6535"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX200217"
},
{
"source": "security@debian.org",
"tags": [
"Permissions Required"
],
"url": "https://support.citrix.com/article/CTX200223"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075"
},
{
"source": "security@debian.org",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/34879/"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/37816/"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/38849/"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/39918/"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/40619/"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/40938/"
},
{
"source": "security@debian.org",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42938/"
},
{
"source": "security@debian.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/support/shellshock/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://advisories.mageia.org/MGASA-2014-0388.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://jvn.jp/en/jp/JVN55667175/index.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry",
"Vendor Advisory"
],
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1293.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://linux.oracle.com/errata/ELSA-2014-1294.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://seclists.org/fulldisclosure/2014/Oct/0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/58200"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59272"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59737"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/59907"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60024"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60034"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60044"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60055"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60063"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60193"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60325"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60433"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/60947"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61065"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61128"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61129"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61188"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61283"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61287"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61291"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61313"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61328"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61442"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61471"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61503"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61542"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61547"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61550"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61552"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61565"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61603"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61633"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61641"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61643"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61654"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61676"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61700"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61703"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61711"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61715"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61780"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61816"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61855"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61857"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/61873"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62228"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62312"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://secunia.com/advisories/62343"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.apple.com/kb/HT6495"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://support.novell.com/security/cve/CVE-2014-6271.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015701"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.novell.com/support/kb/doc.php?id=7015721"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/70103"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.ubuntu.com/usn/USN-2362-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"US Government Resource"
],
"url": "http://www.us-cert.gov/ncas/alerts/TA14-268A"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://access.redhat.com/articles/1200223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://access.redhat.com/node/1200223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.apple.com/kb/HT6535"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.citrix.com/article/CTX200217"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
],
"url": "https://support.citrix.com/article/CTX200223"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Third Party Advisory"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/34879/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/37816/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/38849/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/39918/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/40619/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/40938/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/42938/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.suse.com/support/shellshock/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6271"
}
],
"sourceIdentifier": "security@debian.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-78"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
VAR-201409-1156
Vulnerability from variot - Updated: 2025-12-21 20:24GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. An attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition.
This vulnerability allows users that have been granted access to a shell script to escalate privilege and execute unrestricted commands at the same security level as the Bash script. Customers who need to upgrade the firmware of their Superdome X or HP Converged System 900 for SAP HANA should contact HP Technical Support to obtain the firmware or plan to schedule an onsite visit with an HP Services field service professional.
NOTE: HP strongly recommends implementing the following security best practices to help reduce both known and future security vulnerability risks:
Isolate the HP Superdome X or HP Converged System 900 for SAP HANA's management network by keeping it separate from the data or production network, and not connecting it directly to the Internet without additional access authentication. Patch and maintain Lightweight Directory Access Protocol (LDAP) and web servers. Use virus scanners, intrusion detection/prevention systems (IDS/IPS), and vulnerability scanners regularly. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
Note: the current version of the following document is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/ docDisplay?docId=emr_na-c04467807
SUPPORT COMMUNICATION - SECURITY BULLETIN
Document ID: c04467807 Version: 2
HPSBGN03117 rev.2 - HP Remote Device Access: Virtual Customer Access System (vCAS) running Bash Shell, Remote Code Execution
NOTICE: The information in this Security Bulletin should be acted upon as soon as possible.
Release Date: 2014-09-30 Last Updated: 2014-11-11
Potential Security Impact: Remote code execution
Source: Hewlett-Packard Company, HP Software Security Response Team
VULNERABILITY SUMMARY A potential security vulnerability has been identified with HP Remote Device Access: Virtual Customer Access System (vCAS) running Bash Shell.
NOTE: The vCAS product is vulnerable only if DHCP is enabled.
References:
CVE-2014-6271 CVE-2014-7169 SSRT101724
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.
All vCAS versions prior to 14.10-38402
BACKGROUND
CVSS 2.0 Base Metrics
Reference Base Vector Base Score CVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 CVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0 =========================================================== Information on CVSS is documented in HP Customer Notice: HPSN-2008-002
RESOLUTION
HP has made the following updates available to resolve the vulnerability in HP Remote Device Access: Virtual Customer Access System (vCAS) running Bash Shell.
Customers should upgrade their vCAS systems using the web UI or the "casupdate" command.
There are also new VirtualBox and VMware ESX images available:
- VMware ESX/ESXi image:
https://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402.ova
- VirtualBox image:
https://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402-vbox.ova
NOTE:
- HP recommends to not power-down or disconnect the vCAS until the
update is available. - The vCAS pulls down the latest updates from HP by using Ubuntus apt-get facility. - HP does not push updates out on to the vCAS so customers will have to be proactive and install the latest updates.
Actions Required
The DHCP exploit can be mitigated by ensuring that DHCP is disabled on
the vCAS as detailed in MITIGATION INFORMATION below. Download updates by using a web browser:
1. Connect to the vCAS and login as hp-admin
2. Go to Tools -> Software Updates
3. Under "Manual Actions" select Check now and then upgrade now
See HP Remote Device Access vCAS User Guide, Chapter 4, Software Updates
for more details:
http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/action.pro
cess/public/psi/manualsDisplay/?sp4ts.oid=4256914&javax.portlet.action=true&s pf_p.tpst=psiContentDisplay&javax.portlet.begCacheTok=com.vignette.cachetoken &spf_p.prp_psiContentDisplay=wsrp-interactionState%3DdocId%253Demr_na-c033816 86%257CdocLocale%253Den_US&javax.portlet.endCacheTok=com.vignette.cachetoken
MITIGATION INFORMATION
A Shellshock attack requires the definition of an environment variable
introduced into Bash. The vCAS has three attack vectors: SSH, the lighttpd web server, and the DHCP client.
- The exploit does not elevate privileges.
The DHCP client uses Bash scripts and is vulnerable to Shellshock. The
DHCP exploit can be mitigated by ensuring that DHCP is disabled on the vCAS.
Note: HP strongly discourages the use of DHCP on the vCAS.
The web UI forces the vCAS user to assign a static IP address and change
the hp-admin password. A vCAS user must manually configure DHCP for use on the vCAS.
A vCAS user can verify that DHCP is disabled by inspecting the file
"/etc/network/interfaces" and ensuring that the "iface" line for device "eth0" is set for a static IP.
Example of a static IP configuration:
# The primary network interface
auto eth0
iface eth0 inet static
address 172.27.1.68
netmask 255.255.255.0
gateway 172.27.1.1
HISTORY Version:1 (rev.1) - 30 September 2014 Initial release Version:2 (rev.2) - 11 November 2014 Software updates available
Third Party Security Patches: Third party security patches that are to be installed on systems running HP software products should be applied in accordance with the customer's patch management policy.
Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HP Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hp.com.
Report: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com
Subscribe: To initiate a subscription to receive future HP Security Bulletin alerts via Email: http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins
Security Bulletin Archive: A list of recently released Security Bulletins is available here: https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/
Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB.
3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MP = MPE/iX MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PI = Printing and Imaging PV = ProCurve ST = Storage Software TU = Tru64 UNIX UX = HP-UX
Copyright 2014 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP or its affiliates, subcontractors or suppliers will be liable for incidental,special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (GNU/Linux)
iEYEARECAAYFAlRiTVMACgkQ4B86/C0qfVkVXwCgnt3AiI6i2W/bYpzl1OdUS3V0 240AnAzsgVtgeyaCKxbE7+fRS74qViiq =Gpae -----END PGP SIGNATURE----- . These vulnerabilities ("Padding Oracle on Downgraded Legacy Encryption" or "POODLE", Heartbleed, and Shellshock) could be exploited remotely to create a Denial of Service (DoS), allow unauthorized access, or disclose information.
Mitigation Instructions
HP recommends the following mitigation steps to reduce the risk of this vulnerability for HP StoreEver ESL G3 Tape Library. Click on "Support"
-
From the pull-down, select "Drivers & Downloads"
-
In the Find my Product field, enter "MSL6480"
-
Expand the "HP StoreEver MSL6480 Tape Library " entry
-
Select "HP StoreEver MSL6480 Scalable Base Module"
-
Select "OS Independent" for the operating system
-
Expand the "Firmware Storage Tape" entry
NOTE: Versions of HP StoreOnce Backup software prior to 3.11.4 contain the vulnerable version of Bash. However, HP is unaware of any method that would allow this vulnerability to be exploited on HP StoreOnce Backup systems but is providing an updated version of Bash Shell as a precaution.
Please refer to the RESOLUTION section below for a list of impacted products. This bulletin will be revised when the software update is released.
Note: HP and the switch vendor recommend running an active version of Fabric OS (FOS) listed on the HP Single Point of Connectivity Knowledge (SPOCK) website ( http://h20272.www2.hp.com/ ) and applying the work-around information provided in the MITIGATION INFORMATION section below to protect HP StoreFabric B-series switches from this vulnerability.
Fabric OS (FOS) v7.3.0b (This version will be available soon and this bulletin will revised at that time)
The following focused fix FOS versions are available for the previously released versions and have been renamed to include an additional hexadecimal character appended to the FOS version on which it is based:
FOS v7.2.1c1
FOS v7.2.0d6
FOS v7.1.2b1
FOS v7.1.1c1
FOS v7.1.0cb
FOS v7.0.2e1
FOS v7.0.0d1
FOS v6.4.3f3
FOS v6.4.2a3
FOS v6.2.2f9
MITIGATION INFORMATION
HP recommends the following steps to reduce the risk of this vulnerability:
- Place the HP StoreFabric SAN switch and other data center critical
infrastructure behind a firewall to disallow access from the Internet. - Change all HP StoreFabric switch default account passwords, including the root passwords, from the default factory passwords. - Examine the list of accounts, including ones on the switch and those existing on remote authentication servers such as RADIUS, LDAP, and TACAS+, to ensure only necessary personnel can gain access to HP StoreFabric FOS switches. Delete guest accounts and temporary accounts created for one-time usage needs. - Utilize FOS password policy management to strengthen the complexity, age, and history requirements of switch account passwords
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201409-1156",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "linux",
"scope": "eq",
"trust": 1.3,
"vendor": "oracle",
"version": "5"
},
{
"model": "esx",
"scope": "eq",
"trust": 1.3,
"vendor": "vmware",
"version": "4.0"
},
{
"model": "esx",
"scope": "eq",
"trust": 1.3,
"vendor": "vmware",
"version": "4.1"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.8"
},
{
"model": "stn6800",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "4.1.2.06"
},
{
"model": "big-ip edge gateway",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.1.0"
},
{
"model": "storwize v3700",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.7"
},
{
"model": "traffix signaling delivery controller",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "3.3.2"
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"model": "mac os x",
"scope": "lt",
"trust": 1.0,
"vendor": "apple",
"version": "10.10.0"
},
{
"model": "open enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "11.0"
},
{
"model": "big-iq device",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "4.2.0"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.2"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "4"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "traffix signaling delivery controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "4.0.0"
},
{
"model": "stn6500",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "3.8.0.07"
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"model": "qradar vulnerability manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.6"
},
{
"model": "qradar vulnerability manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0"
},
{
"model": "pureapplication system",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.1.0.4"
},
{
"model": "eos",
"scope": "gte",
"trust": 1.0,
"vendor": "arista",
"version": "4.12.0"
},
{
"model": "security access manager for web 7.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.0.0.1"
},
{
"model": "stn6800",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "4.1.2.0"
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"model": "security access manager for web 7.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.0.0.8"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.9"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "storwize v7000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.7"
},
{
"model": "vcenter server appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "5.1"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "flex system v7000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.0"
},
{
"model": "security access manager for web 7.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.0.0.7"
},
{
"model": "security gateway",
"scope": "lt",
"trust": 1.0,
"vendor": "checkpoint",
"version": "r77.30"
},
{
"model": "enterprise linux for power big endian",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0_ppc64"
},
{
"model": "enterprise linux for ibm z systems",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7_s390x"
},
{
"model": "infosphere guardium database activity monitoring",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "8.2"
},
{
"model": "bash",
"scope": "lte",
"trust": 1.0,
"vendor": "gnu",
"version": "4.3"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.4"
},
{
"model": "storwize v3500",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.7"
},
{
"model": "storwize v3700",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.0"
},
{
"model": "big-ip application acceleration manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.0"
},
{
"model": "enterprise linux for power big endian eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4_ppc64"
},
{
"model": "traffix signaling delivery controller",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "3.5.1"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "4.0"
},
{
"model": "workload deployer",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "3.1.0.7"
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.1"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "14.04"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.3"
},
{
"model": "smartcloud provisioning",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.1.0"
},
{
"model": "big-ip wan optimization manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"model": "big-ip global traffic manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.0"
},
{
"model": "storwize v3700",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.0"
},
{
"model": "stn6500",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "4.1.2.06"
},
{
"model": "big-ip protocol security module",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"model": "enterprise linux for ibm z systems",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.5_s390x"
},
{
"model": "enterprise linux for power big endian eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.5_ppc64"
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "netscaler sdx",
"scope": "gte",
"trust": 1.0,
"vendor": "citrix",
"version": "10"
},
{
"model": "pureapplication system",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.0.0.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "software defined network for virtual environments",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "1.2.1"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "11"
},
{
"model": "storwize v5000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.0"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.1"
},
{
"model": "enterprise linux server from rhui",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "mac os x",
"scope": "gte",
"trust": 1.0,
"vendor": "apple",
"version": "10.0.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.9"
},
{
"model": "storwize v7000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "1.5.0.4"
},
{
"model": "big-ip wan optimization manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.2"
},
{
"model": "qradar vulnerability manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.8"
},
{
"model": "storwize v7000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.0"
},
{
"model": "enterprise manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "3.0.0"
},
{
"model": "big-ip local traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.1"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5"
},
{
"model": "storwize v5000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.0"
},
{
"model": "san volume controller",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.0.11"
},
{
"model": "stn6500",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "4.1.2.0"
},
{
"model": "enterprise linux for power big endian",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0_ppc"
},
{
"model": "virtualization",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "3.4"
},
{
"model": "stn7800",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "3.9.1.0"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "12.04"
},
{
"model": "storwize v7000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.0"
},
{
"model": "storwize v3700",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.1.0.0"
},
{
"model": "security access manager for web 7.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.0.0.3"
},
{
"model": "gluster storage server for on-premise",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "2.1"
},
{
"model": "zenworks configuration management",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "11.1"
},
{
"model": "san volume controller",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.9"
},
{
"model": "security access manager for web 8.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "8.0.0.2"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "netscaler sdx",
"scope": "lt",
"trust": 1.0,
"vendor": "citrix",
"version": "10.1.129.11r1"
},
{
"model": "enterprise linux for ibm z systems",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.9_s390x"
},
{
"model": "stn7800",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "3.9.1.08"
},
{
"model": "big-ip access policy manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.1.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "big-ip edge gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.3.0"
},
{
"model": "pureapplication system",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.0.0.0"
},
{
"model": "enterprise linux server from rhui",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "traffix signaling delivery controller",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "3.4.1"
},
{
"model": "ubuntu linux",
"scope": "eq",
"trust": 1.0,
"vendor": "canonical",
"version": "10.04"
},
{
"model": "netscaler sdx",
"scope": "gte",
"trust": 1.0,
"vendor": "citrix",
"version": "10.5"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "10"
},
{
"model": "eos",
"scope": "gte",
"trust": 1.0,
"vendor": "arista",
"version": "4.11.0"
},
{
"model": "storwize v5000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.1.0.0"
},
{
"model": "big-iq security",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "4.0.0"
},
{
"model": "zenworks configuration management",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "10.3"
},
{
"model": "traffix signaling delivery controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "4.0.5"
},
{
"model": "eos",
"scope": "lt",
"trust": 1.0,
"vendor": "arista",
"version": "4.13.9"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "storwize v7000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.1.0.0"
},
{
"model": "big-ip advanced firewall manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.1"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5"
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"model": "security access manager for web 8.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "8.0.0.5"
},
{
"model": "qradar vulnerability manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.3"
},
{
"model": "storwize v5000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.0.11"
},
{
"model": "big-ip global traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.4"
},
{
"model": "enterprise linux for ibm z systems",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4_s390x"
},
{
"model": "linux enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12"
},
{
"model": "eos",
"scope": "lt",
"trust": 1.0,
"vendor": "arista",
"version": "4.9.12"
},
{
"model": "flex system v7000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.0"
},
{
"model": "stn7800",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "3.8.0.07"
},
{
"model": "big-ip wan optimization manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.3.0"
},
{
"model": "starter kit for cloud",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.2.0"
},
{
"model": "open enterprise server",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "2.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.4"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "stn6800",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "3.8.0.0"
},
{
"model": "security access manager for web 7.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.0.0.6"
},
{
"model": "eos",
"scope": "gte",
"trust": 1.0,
"vendor": "arista",
"version": "4.9.0"
},
{
"model": "storwize v5000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.9"
},
{
"model": "big-ip webaccelerator",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"model": "enterprise linux for power big endian eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7_ppc64"
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"model": "security access manager for web 7.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.0.0.5"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.7"
},
{
"model": "storwize v7000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.9"
},
{
"model": "linux enterprise software development kit",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "11"
},
{
"model": "enterprise linux server",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "qradar vulnerability manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.2"
},
{
"model": "big-iq device",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "4.4.0"
},
{
"model": "netscaler sdx",
"scope": "lt",
"trust": 1.0,
"vendor": "citrix",
"version": "9.3.67.5r1"
},
{
"model": "big-ip application acceleration manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.4.0"
},
{
"model": "netscaler sdx",
"scope": "lt",
"trust": 1.0,
"vendor": "citrix",
"version": "10.5.52.11r1"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "big-ip link controller",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.1"
},
{
"model": "big-ip protocol security module",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "enterprise linux for power big endian",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.4_ppc64"
},
{
"model": "smartcloud entry appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.3.0"
},
{
"model": "big-ip analytics",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.1"
},
{
"model": "big-ip policy enforcement manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.0"
},
{
"model": "flex system v7000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.1.0.0"
},
{
"model": "smartcloud entry appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "3.2.0"
},
{
"model": "eos",
"scope": "lt",
"trust": 1.0,
"vendor": "arista",
"version": "4.10.9"
},
{
"model": "eos",
"scope": "gte",
"trust": 1.0,
"vendor": "arista",
"version": "4.13.0"
},
{
"model": "enterprise manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "2.1.0"
},
{
"model": "big-ip policy enforcement manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.1"
},
{
"model": "storwize v3500",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.0"
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "eos",
"scope": "lt",
"trust": 1.0,
"vendor": "arista",
"version": "4.11.11"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.4"
},
{
"model": "enterprise manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "3.1.1"
},
{
"model": "enterprise linux for power big endian eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6_ppc64"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.8.15"
},
{
"model": "eos",
"scope": "gte",
"trust": 1.0,
"vendor": "arista",
"version": "4.10.0"
},
{
"model": "stn7800",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "4.1.2.06"
},
{
"model": "big-ip policy enforcement manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.3.0"
},
{
"model": "zenworks configuration management",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "11.3.0"
},
{
"model": "eos",
"scope": "lt",
"trust": 1.0,
"vendor": "arista",
"version": "4.14.4f"
},
{
"model": "enterprise linux for scientific computing",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.6"
},
{
"model": "security access manager for mobile 8.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "8.0.0.5"
},
{
"model": "storwize v3500",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.0"
},
{
"model": "flex system v7000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.0.11"
},
{
"model": "zenworks configuration management",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "11"
},
{
"model": "big-ip application security manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.1"
},
{
"model": "storwize v3700",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.0.11"
},
{
"model": "san volume controller",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.0"
},
{
"model": "linux enterprise desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.7"
},
{
"model": "flex system v7000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.9"
},
{
"model": "stn6500",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "3.8.0.0"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "oracle",
"version": "6"
},
{
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "7.0"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.5"
},
{
"model": "qradar vulnerability manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.4"
},
{
"model": "stn7800",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "4.1.2.0"
},
{
"model": "big-ip advanced firewall manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.0"
},
{
"model": "infosphere guardium database activity monitoring",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "9.1"
},
{
"model": "security access manager for web 8.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "8.0.0.3"
},
{
"model": "storwize v3700",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.9"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.5"
},
{
"model": "big-ip edge gateway",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"model": "linux enterprise software development kit",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "12"
},
{
"model": "linux enterprise desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "11"
},
{
"model": "storwize v3500",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.1.0.0"
},
{
"model": "big-iq cloud",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "4.4.0"
},
{
"model": "san volume controller",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.7"
},
{
"model": "pureapplication system",
"scope": "lte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.0.0.4"
},
{
"model": "eos",
"scope": "gte",
"trust": 1.0,
"vendor": "arista",
"version": "4.14.0"
},
{
"model": "mageia",
"scope": "eq",
"trust": 1.0,
"vendor": "mageia",
"version": "3.0"
},
{
"model": "enterprise linux for ibm z systems",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5_s390x"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.6"
},
{
"model": "big-ip access policy manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.0"
},
{
"model": "traffix signaling delivery controller",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "4.1.0"
},
{
"model": "arx",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "6.0.0"
},
{
"model": "eos",
"scope": "lt",
"trust": 1.0,
"vendor": "arista",
"version": "4.12.9"
},
{
"model": "big-ip webaccelerator",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "qradar vulnerability manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.1"
},
{
"model": "storwize v3500",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.0.11"
},
{
"model": "stn6800",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "3.9.1.0"
},
{
"model": "big-ip advanced firewall manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.3.0"
},
{
"model": "storwize v7000",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.5.0.0"
},
{
"model": "security access manager for mobile 8.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "8.0.0.2"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "13.1"
},
{
"model": "big-ip local traffic manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.0"
},
{
"model": "big-ip local traffic manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.0"
},
{
"model": "big-ip link controller",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.0"
},
{
"model": "zenworks configuration management",
"scope": "eq",
"trust": 1.0,
"vendor": "novell",
"version": "11.2"
},
{
"model": "storwize v3500",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.9"
},
{
"model": "stn6800",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "3.9.1.08"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.9"
},
{
"model": "security access manager for web 7.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.0.0.2"
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "big-ip wan optimization manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"model": "qts",
"scope": "eq",
"trust": 1.0,
"vendor": "qnap",
"version": "4.1.1"
},
{
"model": "arx",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "6.4.0"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.0"
},
{
"model": "security access manager for mobile 8.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "8.0.0.1"
},
{
"model": "enterprise linux for power big endian eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3_ppc64"
},
{
"model": "big-ip analytics",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "pureapplication system",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.1.0.0"
},
{
"model": "security access manager for mobile 8.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "8.0.0.3"
},
{
"model": "big-iq security",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "4.4.0"
},
{
"model": "enterprise linux server aus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.2"
},
{
"model": "storwize v5000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.7"
},
{
"model": "vcenter server appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "5.0"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0"
},
{
"model": "san volume controller",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "1.1.0.0"
},
{
"model": "big-ip webaccelerator",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.3.0"
},
{
"model": "studio onsite",
"scope": "eq",
"trust": 1.0,
"vendor": "suse",
"version": "1.3"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0"
},
{
"model": "enterprise linux for power big endian eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5_ppc64"
},
{
"model": "enterprise linux workstation",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "storwize v7000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "1.4.3.5"
},
{
"model": "big-ip application security manager",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.0"
},
{
"model": "big-ip edge gateway",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "enterprise linux for ibm z systems",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.4_s390x"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "12.3"
},
{
"model": "stn6800",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "3.8.0.07"
},
{
"model": "big-ip application security manager",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "big-ip application acceleration manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.1"
},
{
"model": "big-ip protocol security module",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.4.1"
},
{
"model": "vcenter server appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "vmware",
"version": "5.5"
},
{
"model": "enterprise linux for power big endian",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.0_ppc64"
},
{
"model": "san volume controller",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2.0.0"
},
{
"model": "stn6500",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "3.9.1.0"
},
{
"model": "mageia",
"scope": "eq",
"trust": 1.0,
"vendor": "mageia",
"version": "4.0"
},
{
"model": "smartcloud entry appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "2.4.0"
},
{
"model": "enterprise linux for power big endian",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "5.9_ppc"
},
{
"model": "big-ip global traffic manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "11.5.1"
},
{
"model": "big-ip webaccelerator",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"model": "opensuse",
"scope": "eq",
"trust": 1.0,
"vendor": "opensuse",
"version": "13.2"
},
{
"model": "workload deployer",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "3.1.0"
},
{
"model": "enterprise manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "2.3.0"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "big-iq cloud",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "4.0.0"
},
{
"model": "smartcloud entry appliance",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "3.1.0"
},
{
"model": "infosphere guardium database activity monitoring",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "9.0"
},
{
"model": "stn6500",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "3.9.1.08"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "6.5"
},
{
"model": "security access manager for web 7.0",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.0.0.4"
},
{
"model": "enterprise linux for ibm z systems",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6_s390x"
},
{
"model": "enterprise linux for scientific computing",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "big-ip access policy manager",
"scope": "lte",
"trust": 1.0,
"vendor": "f5",
"version": "10.2.4"
},
{
"model": "qradar risk manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.0"
},
{
"model": "enterprise linux desktop",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "enterprise linux eus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.6"
},
{
"model": "big-ip link controller",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "10.0.0"
},
{
"model": "enterprise linux server from rhui",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"model": "enterprise linux for ibm z systems",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3_s390x"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.2"
},
{
"model": "stn7800",
"scope": "gte",
"trust": 1.0,
"vendor": "ibm",
"version": "3.8.0.0"
},
{
"model": "flex system v7000",
"scope": "lt",
"trust": 1.0,
"vendor": "ibm",
"version": "7.3.0.7"
},
{
"model": "qradar security information and event manager",
"scope": "eq",
"trust": 1.0,
"vendor": "ibm",
"version": "7.1.1"
},
{
"model": "qts",
"scope": "lt",
"trust": 1.0,
"vendor": "qnap",
"version": "4.1.1"
},
{
"model": "big-ip analytics",
"scope": "eq",
"trust": 1.0,
"vendor": "f5",
"version": "11.6.0"
},
{
"model": "big-ip protocol security module",
"scope": "gte",
"trust": 1.0,
"vendor": "f5",
"version": "11.0.0"
},
{
"model": "enterprise linux server tus",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.3"
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "apple",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "avaya",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "barracuda",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "blue coat",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "centos",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "check point",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cisco",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "cygwin",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "d link",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "debian gnu linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "dell computer",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "extreme",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "f5",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "fedora",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "fireeye",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "fortinet",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "gnu bash",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "gentoo linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "hewlett packard",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ibm",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "juniper",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "mageia",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "mcafee",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "monroe",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "nec",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "niksun",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "netapp",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "novell",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "oracle",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "palo alto",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "qnap security",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "red hat",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "suse linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "slackware linux",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "sophos",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "trend micro",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "ubuntu",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "vmware",
"version": null
},
{
"model": null,
"scope": null,
"trust": 0.8,
"vendor": "xirrus",
"version": null
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": "\u30fb vmware product details: vmsa-2014-0010"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": "4.3 to"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": "\u30fbfujitsu product details: gnu bash to os fujitsu product response to \"comm injection vulnerability\""
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": "hewlett-packard product details: hpsbgn03117 ssrt101724 other"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": "oracle product details: bash \"shellshock\" vulnerabilities - cve-2014-7169"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": "cisco systems product details: cisco-sa-20140926-"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": "\u30fbdetails of hitachi products: server/client products vulnerability (cve-2014-6271,cve-2014-7169 other ) about the impact of other"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": "\u30fbdetails of nippon electric products: av14-003"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": null
},
{
"model": "bash",
"scope": "eq",
"trust": 0.8,
"vendor": "gnu",
"version": "\u30fbapple product details: ht6495 , ht6535"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1004"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375127"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "12.0.742.100"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1033"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1044"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0.1"
},
{
"model": "ip deskphone",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "96x16.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.322.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.391.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.50"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.306.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1012"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1039"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "3.00.0(2)"
},
{
"model": "workcentre",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "7238"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.539.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.434.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.529.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1031"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "16.0.912.75"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.399.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.203"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "17.0.963.60"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.365.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.105"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.474.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.335.2"
},
{
"model": "chrome beta",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.249.78"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.326.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.317.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.499.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.47255"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.76"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.40"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.447.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.507.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.366.1"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.2.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.213"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.306"
},
{
"model": "secure access control server",
"scope": null,
"trust": 0.3,
"vendor": "cisco",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.530.0"
},
{
"model": "emergency responder",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "1.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.348.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.458.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.208"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1010"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.507.2"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.1.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.2.149.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.18"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.366.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.82"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.395.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.6"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0"
},
{
"model": "phaser",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "78000"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.13"
},
{
"model": "hat enterprise linux hpc node",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.127"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.4"
},
{
"model": "linux i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1051"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.225"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1061"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.385.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.319.0"
},
{
"model": "aura system platform",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.366.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.535.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.445.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.514.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.443.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.296.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "9.0.597.107"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.219"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.374.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.275.1"
},
{
"model": "ip deskphone",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "96x16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "17.0.96379"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.417.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.218"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.217"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.21"
},
{
"model": "aura system platform sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.57"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1043"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1049"
},
{
"model": "workcentre",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "7242"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.7"
},
{
"model": "aura session manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.71"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.407.0"
},
{
"model": "colorqube",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "9393"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1057"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.518.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.346.0"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "70000"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.421.0"
},
{
"model": "linux sparc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.51"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.390.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.6"
},
{
"model": "wide area application services",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "colorqube",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "9303"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.382.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.35"
},
{
"model": "aura application server sip core",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "53002.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.438.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.2"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "4.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.39"
},
{
"model": "secure access link",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.536.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.462.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "15.0.874.120"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "3.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.77"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.11"
},
{
"model": "workcentre",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "7235"
},
{
"model": "email gateway patch",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.01"
},
{
"model": "meeting exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "ip office application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "8.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.368.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.209"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.77"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.226"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.87"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "17.0.96365"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.126"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.481.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.489.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "19"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0.2"
},
{
"model": "aura messaging",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.393.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.362.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.531.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.3"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.2"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "4.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.423.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "15.0.874.121"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.323.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.356.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "16.0.912.77"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.93"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.23"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.370.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.380.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "13.0.782.112"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.447.0"
},
{
"model": "show and share",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5(2)"
},
{
"model": "mds",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.216"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.344"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.512.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.419.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.66"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.48"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.361.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1018"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.58"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.222.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.4.154.22"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "4.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.437.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.483.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.467.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.435.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.200"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "13.0.782.215"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.278.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.413.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.452.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1017"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.64"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.537.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.302.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.379.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.513.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.453.1"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "3.0"
},
{
"model": "insight control",
"scope": "eq",
"trust": 0.3,
"vendor": "hp",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.2.149.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "14.0.835.202"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1062"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.30"
},
{
"model": "secure access link",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "2.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.490.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1020"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.1.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.469.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.57"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1042"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1058"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.158.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.49"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.334.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.303"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.506.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1054"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.458.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "18.0.1025.168"
},
{
"model": "linux ia-64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.404.0"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "6.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.414.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.494.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.335.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.484.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1030"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.85"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.328.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.360.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.211"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.482.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.479.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.381.0"
},
{
"model": "directory pro",
"scope": "eq",
"trust": 0.3,
"vendor": "cosmicperl",
"version": "10.0.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.104"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.394.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.511.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.437.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.503.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.415.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.03"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.364.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.521.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.507.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.520.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.349.0"
},
{
"model": "aura messaging",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1022"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.528.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.7"
},
{
"model": "studio",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.458.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.450.3"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "3.2.48"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.350.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.322.2"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "3.1.4"
},
{
"model": "aura session manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.476.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.2491064"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.61"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.63"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.35"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.354.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.345.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.325.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.215"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1026"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.222.12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.33"
},
{
"model": "aura presence services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.335.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.369.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.431.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.347.0"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.1.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.24"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.498.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.412.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.83"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1038"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.406.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.302"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.310"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.515.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.416.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.63"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "16.0.91275"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.55"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.445.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.409.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.329.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1006"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.68"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "40000"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.315.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.34"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.499.0"
},
{
"model": "digital media manager",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.32"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.0.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.54"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.277.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.384.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.69"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.170.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.29"
},
{
"model": "gss 4492r global site selector",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.350.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.10"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0.2-41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.157.2"
},
{
"model": "meeting exchange",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.422.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.511.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.3.154.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.61"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.529.1"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0.1-32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.503.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.24"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.299.0"
},
{
"model": "chrome beta",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.193.2"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "1000v0"
},
{
"model": "linux amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.371.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.8"
},
{
"model": "chrome beta",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.169.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "13.0.782.107"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.272.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.169.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.411.0"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.452.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.288.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.202"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.496.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.363.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.294.0"
},
{
"model": "linux lts amd64",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "12.04"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.223.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.367.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1016"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1045"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.223.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.36"
},
{
"model": "chrome beta",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.454.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.28"
},
{
"model": "workcentre",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "7245"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.453.0"
},
{
"model": "linux mips",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.466.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.337.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.301.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.68"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.507.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.96"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.366.4"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.91"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1032"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.80"
},
{
"model": "message networking sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.473.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.441.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.60"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.549.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1040"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.157.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.88"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.466.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.314.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "18.0.1025.151"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.207"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "8.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.440.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.426.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.343.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.355.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.327.0"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.477.0"
},
{
"model": "aix",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1055"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.22"
},
{
"model": "aura system manager sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.67"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.401.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.516.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.65"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.356.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.430.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.493.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.335.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.457.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.21"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0.0-407"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "14.0.835.186"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.29"
},
{
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.308.0"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.3"
},
{
"model": "aura session manager sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.211.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.92"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "16.0.912.63"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.401.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.495.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1019"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.2491036"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.522.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.356.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "9.0.597.94"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.341.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.223"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.95"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.57"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.54"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.2.152.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.338.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.75"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.451.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.450.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.84"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.322.1"
},
{
"model": "email gateway",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "7.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.222.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1015"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.398.0"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.195.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.404.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.531.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.480.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.466.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.536.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.94"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.19"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.28"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "13"
},
{
"model": "email gateway hotfix",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "6.7.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.466.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.30"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.4"
},
{
"model": "aura communication manager utility services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.427.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.204"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.466.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375125"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.551.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.128"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1024"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.19"
},
{
"model": "catalyst",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "6500"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.1"
},
{
"model": "aix",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "5.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.301"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.222.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.276.0"
},
{
"model": "secure access link",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.544.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.500.1"
},
{
"model": "hat enterprise linux desktop client",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.39"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.8"
},
{
"model": "communication server 1000m",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1041"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1021"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.336.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.305.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.61"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1034"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.38"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.1.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.222"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.1.1-340"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.98"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.2"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.2"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.317.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.65"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.320.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.65"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.12"
},
{
"model": "communication server 1000m signaling server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.224.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.366.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.33"
},
{
"model": "communication server 1000e",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.339.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.335.1"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.424.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.39"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.1.2-33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1035"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.288.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "12.0.742.112"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.478.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.100"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.540.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.465.2"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.1"
},
{
"model": "phaser",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "67000"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.223.8"
},
{
"model": "ios",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.542.0"
},
{
"model": "telepresence video communication server",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.59"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.62"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.223.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.37599"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.330.0"
},
{
"model": "enterprise linux",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1014"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.212.1"
},
{
"model": "studio",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.529.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1001"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.492.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.510.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.3.1549"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.410.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.79"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1056"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.1.0-1470"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.45"
},
{
"model": "email gateway hotfix",
"scope": "eq",
"trust": 0.3,
"vendor": "mcafee",
"version": "6.7.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.547.1"
},
{
"model": "linux lts i386",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "12.04"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.536.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.405.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.292.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.212.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.2"
},
{
"model": "aura system platform",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "1.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.2.153.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.49"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1029"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.223.4"
},
{
"model": "vm virtualbox",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "3.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.223.7"
},
{
"model": "messaging application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.378.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.2.149.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.62"
},
{
"model": "aura presence services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.551.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1037"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.360.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.466.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1060"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.249.78"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.547.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.300.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.509.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.387.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.27"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.382.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.97"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.290.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.40"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.386.0"
},
{
"model": "aura system manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.425.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.485.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.486.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.450.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "12"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.48"
},
{
"model": "aura system manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "4.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.372.0"
},
{
"model": "aura system platform",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0.2"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.7"
},
{
"model": "studio beta",
"scope": "eq",
"trust": 0.3,
"vendor": "vmware",
"version": "2.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.514.1"
},
{
"model": "bash",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "3.0.16"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.450.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.392.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.403.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.221.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.45"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.5"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.212"
},
{
"model": "linux s/390",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "communication server 1000m signaling server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7.0"
},
{
"model": "aura experience portal",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.302.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1063"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.0"
},
{
"model": "communication server 1000e",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.72"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "15.0.874102"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.206"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.304.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.360.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1028"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.289.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.133"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.51"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.4.154.31"
},
{
"model": "aura session manager sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.487.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.302.3"
},
{
"model": "hat enterprise linux desktop",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.19"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "17.0.963.46"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1046"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.303.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.404.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.2491059"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.332.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.11"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.7.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.159.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.220"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.101"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.73"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "17.0.963.83"
},
{
"model": "aura session manager sp2",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.60"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0.3-29"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.275.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.340.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1013"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.436.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1023"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.373.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.369.0"
},
{
"model": "colorqube",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "9302"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.0.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.397.0"
},
{
"model": "linux arm",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.353.0"
},
{
"model": "aura presence services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.511.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.531.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.89"
},
{
"model": "network analysis module",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "digital media manager",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "5.0"
},
{
"model": "workcentre",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "7228"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.70"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.20"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.43"
},
{
"model": "centos",
"scope": "eq",
"trust": 0.3,
"vendor": "centos",
"version": "5"
},
{
"model": "proactive contact",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.0"
},
{
"model": "ip office application server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "8.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.491.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.300"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "hat enterprise linux long life server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5.6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.535.1"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0.4-26"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.470.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.461.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.437.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.446.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.10"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.321.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.15"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.357.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.459.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.541.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.221"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.536.1"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.81"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "19.0.1084.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.333.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.313.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.475.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.524.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.351.0"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.102"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "1.0.154.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.307"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.471.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1027"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.396.0"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.450.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.415.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.428.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.42"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.309.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.32"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.205"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.16"
},
{
"model": "colorqube",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "9301"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.447.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.460.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.4.154.33"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.344.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.307.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.204"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.9"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1008"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.13"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.156.1"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.2"
},
{
"model": "ds8000",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.25"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.466.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1053"
},
{
"model": "unified ip phone",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.455.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.38"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.488.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.526.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.21"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.449.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.190.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "18.0.1025.142"
},
{
"model": "communication server 1000e signaling server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "aura messaging",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.505.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.400.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.497.0"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "4.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.287.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.286.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.7"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "13.1"
},
{
"model": "aura system platform sp3",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "bash rc1",
"scope": "eq",
"trust": 0.3,
"vendor": "gnu",
"version": "4.0"
},
{
"model": "avamar",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.33"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.103"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.302.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.224"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.369.2"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.2"
},
{
"model": "workcentre",
"scope": "eq",
"trust": 0.3,
"vendor": "xerox",
"version": "7232"
},
{
"model": "hat enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.52"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.444.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.437.3"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "50000"
},
{
"model": "vm virtualbox",
"scope": "eq",
"trust": 0.3,
"vendor": "oracle",
"version": "3.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.696.71"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "13.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.358.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.223.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.548.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.58"
},
{
"model": "aura system manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.360.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.24"
},
{
"model": "http server",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1007"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1047"
},
{
"model": "aura application enablement services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.456.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1052"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "12.0.742.91"
},
{
"model": "aura communication manager utility services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.36"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "17.0.963.78"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.17"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.308"
},
{
"model": "hat enterprise linux workstation",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.8"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "9.0.597.84"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.210"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.550.0"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "ubuntu",
"version": "10.04"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.525.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.490.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.8"
},
{
"model": "linux",
"scope": null,
"trust": 0.3,
"vendor": "gentoo",
"version": null
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.317.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1009"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "17.0.963.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.74"
},
{
"model": "aura communication manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.495.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.432.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.249.89"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.314.0"
},
{
"model": "message networking",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.500.0"
},
{
"model": "aura system platform",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.0.1"
},
{
"model": "aura session manager",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.309"
},
{
"model": "avamar sp1",
"scope": "eq",
"trust": 0.3,
"vendor": "emc",
"version": "5.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.214"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.324.0"
},
{
"model": "communication server 1000e signaling server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.3.6"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1048"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.30"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1050"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.47"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.433.0"
},
{
"model": "aix",
"scope": "eq",
"trust": 0.3,
"vendor": "ibm",
"version": "7.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.408.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.342.8"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.5.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.416.0"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.2.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.52"
},
{
"model": "unified contact center express",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "linux ia-32",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "solaris",
"scope": "eq",
"trust": 0.3,
"vendor": "sun",
"version": "11"
},
{
"model": "linux",
"scope": "eq",
"trust": 0.3,
"vendor": "slackware",
"version": "13.37"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.4.154.18"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.201"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "2.0.172.31"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.11"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.32"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.22"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11.0.672.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.14"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.43"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "3.0.182.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.78"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.354.1"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.504.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.3"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.316.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "14.0.835.163"
},
{
"model": "unified computing system",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.44"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.90"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.6.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.3"
},
{
"model": "communication server 1000m",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.304"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "18.0.1025.162"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "11"
},
{
"model": "communication server 1000e signaling server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7.0"
},
{
"model": "aura communication manager utility services",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "6.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.305"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.464.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.271.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.7"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "8.0.552.237"
},
{
"model": "linux powerpc",
"scope": "eq",
"trust": 0.3,
"vendor": "debian",
"version": "6.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.53"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.517.41"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.418.4"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "0.3.154.0"
},
{
"model": "iq",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "5.1"
},
{
"model": "hat enterprise linux server",
"scope": "eq",
"trust": 0.3,
"vendor": "red",
"version": "6"
},
{
"model": "nexus",
"scope": "eq",
"trust": 0.3,
"vendor": "cisco",
"version": "30000"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.359.0"
},
{
"model": "communication server 1000m signaling server",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7.5"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.383.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.376.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.465.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "10.0.648.205"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.306.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1025"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.375.33"
},
{
"model": "aura application server sip core",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "53002.1"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.0.295.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.536.3"
},
{
"model": "communication server 1000e",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7.5"
},
{
"model": "mac os",
"scope": "eq",
"trust": 0.3,
"vendor": "apple",
"version": "x10.4.2"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.37586"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.538.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "7.0.519.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "6.0.472.56"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "5.0.318.0"
},
{
"model": "chrome",
"scope": "eq",
"trust": 0.3,
"vendor": "google",
"version": "4.1.249.1011"
},
{
"model": "communication server 1000m",
"scope": "eq",
"trust": 0.3,
"vendor": "avaya",
"version": "7.0"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#252743"
},
{
"db": "BID",
"id": "70103"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004410"
},
{
"db": "NVD",
"id": "CVE-2014-6271"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "HP",
"sources": [
{
"db": "PACKETSTORM",
"id": "128764"
},
{
"db": "PACKETSTORM",
"id": "129074"
},
{
"db": "PACKETSTORM",
"id": "130644"
},
{
"db": "PACKETSTORM",
"id": "129069"
},
{
"db": "PACKETSTORM",
"id": "130997"
},
{
"db": "PACKETSTORM",
"id": "128755"
},
{
"db": "PACKETSTORM",
"id": "128509"
},
{
"db": "PACKETSTORM",
"id": "128760"
}
],
"trust": 0.8
},
"cve": "CVE-2014-6271",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "CVE-2014-6271",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.9,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"id": "CVE-2014-6271",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 9.8,
"baseSeverity": "Critical",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2014-6271",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2014-6271",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2014-6271",
"trust": 1.0,
"value": "CRITICAL"
},
{
"author": "NVD",
"id": "CVE-2014-6271",
"trust": 0.8,
"value": "Critical"
},
{
"author": "VULMON",
"id": "CVE-2014-6271",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2014-6271"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004410"
},
{
"db": "NVD",
"id": "CVE-2014-6271"
},
{
"db": "NVD",
"id": "CVE-2014-6271"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix. GNU Bash 4.3 and earlier contains a command injection vulnerability that may allow remote code execution. \nAn attacker can exploit this issue to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. \n\nThis vulnerability allows users that have been granted access to a shell\nscript to escalate privilege and execute unrestricted commands at the same\nsecurity level as the Bash script. Customers who\nneed to upgrade the firmware of their Superdome X or HP Converged System 900\nfor SAP HANA should contact HP Technical Support to obtain the firmware or\nplan to schedule an onsite visit with an HP Services field service\nprofessional. \n\nNOTE: HP strongly recommends implementing the following security best\npractices to help reduce both known and future security vulnerability risks:\n\nIsolate the HP Superdome X or HP Converged System 900 for SAP HANA\u0027s\nmanagement network by keeping it separate from the data or production\nnetwork, and not connecting it directly to the Internet without additional\naccess authentication. \nPatch and maintain Lightweight Directory Access Protocol (LDAP) and web\nservers. \nUse virus scanners, intrusion detection/prevention systems (IDS/IPS), and\nvulnerability scanners regularly. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nNote: the current version of the following document is available here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/\ndocDisplay?docId=emr_na-c04467807\n\nSUPPORT COMMUNICATION - SECURITY BULLETIN\n\nDocument ID: c04467807\nVersion: 2\n\nHPSBGN03117 rev.2 - HP Remote Device Access: Virtual Customer Access System\n(vCAS) running Bash Shell, Remote Code Execution\n\nNOTICE: The information in this Security Bulletin should be acted upon as\nsoon as possible. \n\nRelease Date: 2014-09-30\nLast Updated: 2014-11-11\n\nPotential Security Impact: Remote code execution\n\nSource: Hewlett-Packard Company, HP Software Security Response Team\n\nVULNERABILITY SUMMARY\nA potential security vulnerability has been identified with HP Remote Device\nAccess: Virtual Customer Access System (vCAS) running Bash Shell. \n\n NOTE: The vCAS product is vulnerable only if DHCP is enabled. \n\nReferences:\n\n CVE-2014-6271\n CVE-2014-7169\n SSRT101724\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \n\n All vCAS versions prior to 14.10-38402\n\nBACKGROUND\n\nCVSS 2.0 Base Metrics\n===========================================================\n Reference Base Vector Base Score\nCVE-2014-6271 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\nCVE-2014-7169 (AV:N/AC:L/Au:N/C:C/I:C/A:C) 10.0\n===========================================================\n Information on CVSS is documented\n in HP Customer Notice: HPSN-2008-002\n\nRESOLUTION\n\nHP has made the following updates available to resolve the vulnerability in\nHP Remote Device Access: Virtual Customer Access System (vCAS) running Bash\nShell. \n\n Customers should upgrade their vCAS systems using the web UI or the\n\"casupdate\" command. \n\n There are also new VirtualBox and VMware ESX images available:\n\n - VMware ESX/ESXi image:\nhttps://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402.ova\n\n - VirtualBox image:\nhttps://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402-vbox.ova\n\n NOTE:\n\n - HP recommends to not power-down or disconnect the vCAS until the\nupdate is available. \n - The vCAS pulls down the latest updates from HP by using Ubuntus\napt-get facility. \n - HP does not push updates out on to the vCAS so customers will have to\nbe proactive and install the latest updates. \n\n Actions Required\n\n The DHCP exploit can be mitigated by ensuring that DHCP is disabled on\nthe vCAS as detailed in MITIGATION INFORMATION below. Download updates by\nusing a web browser:\n\n 1. Connect to the vCAS and login as hp-admin\n 2. Go to Tools -\u003e Software Updates\n 3. Under \"Manual Actions\" select Check now and then upgrade now\n\n See HP Remote Device Access vCAS User Guide, Chapter 4, Software Updates\nfor more details:\n\n http://h20566.www2.hp.com/portal/site/hpsc/template.PAGE/action.pro\ncess/public/psi/manualsDisplay/?sp4ts.oid=4256914\u0026javax.portlet.action=true\u0026s\npf_p.tpst=psiContentDisplay\u0026javax.portlet.begCacheTok=com.vignette.cachetoken\n\u0026spf_p.prp_psiContentDisplay=wsrp-interactionState%3DdocId%253Demr_na-c033816\n86%257CdocLocale%253Den_US\u0026javax.portlet.endCacheTok=com.vignette.cachetoken\n\n MITIGATION INFORMATION\n\n A Shellshock attack requires the definition of an environment variable\nintroduced into Bash. The vCAS has three attack vectors: SSH, the lighttpd\nweb server, and the DHCP client. \n\n - The exploit does not elevate privileges. \n\n The DHCP client uses Bash scripts and is vulnerable to Shellshock. The\nDHCP exploit can be mitigated by ensuring that DHCP is disabled on the vCAS. \n\n Note: HP strongly discourages the use of DHCP on the vCAS. \n\n The web UI forces the vCAS user to assign a static IP address and change\nthe hp-admin password. \n A vCAS user must manually configure DHCP for use on the vCAS. \n\n A vCAS user can verify that DHCP is disabled by inspecting the file\n\"/etc/network/interfaces\" and ensuring that the \"iface\" line for device\n\"eth0\" is set for a static IP. \n\n Example of a static IP configuration:\n\n # The primary network interface\n auto eth0\n iface eth0 inet static\n address 172.27.1.68\n netmask 255.255.255.0\n gateway 172.27.1.1\n\nHISTORY\nVersion:1 (rev.1) - 30 September 2014 Initial release\nVersion:2 (rev.2) - 11 November 2014 Software updates available\n\nThird Party Security Patches: Third party security patches that are to be\ninstalled on systems running HP software products should be applied in\naccordance with the customer\u0027s patch management policy. \n\nSupport: For issues about implementing the recommendations of this Security\nBulletin, contact normal HP Services support channel. For other issues about\nthe content of this Security Bulletin, send e-mail to security-alert@hp.com. \n\nReport: To report a potential security vulnerability with any HP supported\nproduct, send Email to: security-alert@hp.com\n\nSubscribe: To initiate a subscription to receive future HP Security Bulletin\nalerts via Email:\nhttp://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins\n\nSecurity Bulletin Archive: A list of recently released Security Bulletins is\navailable here:\nhttps://h20564.www2.hp.com/portal/site/hpsc/public/kb/secBullArchive/\n\nSoftware Product Category: The Software Product Category is represented in\nthe title by the two characters following HPSB. \n\n3C = 3COM\n3P = 3rd Party Software\nGN = HP General Software\nHF = HP Hardware and Firmware\nMP = MPE/iX\nMU = Multi-Platform Software\nNS = NonStop Servers\nOV = OpenVMS\nPI = Printing and Imaging\nPV = ProCurve\nST = Storage Software\nTU = Tru64 UNIX\nUX = HP-UX\n\nCopyright 2014 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or editorial errors\nor omissions contained herein. The information provided is provided \"as is\"\nwithout warranty of any kind. To the extent permitted by law, neither HP or\nits affiliates, subcontractors or suppliers will be liable for\nincidental,special or consequential damages including downtime cost; lost\nprofits; damages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. The\ninformation in this document is subject to change without notice. \nHewlett-Packard Company and the names of Hewlett-Packard products referenced\nherein are trademarks of Hewlett-Packard Company in the United States and\nother countries. Other product and company names mentioned herein may be\ntrademarks of their respective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v2.0.19 (GNU/Linux)\n\niEYEARECAAYFAlRiTVMACgkQ4B86/C0qfVkVXwCgnt3AiI6i2W/bYpzl1OdUS3V0\n240AnAzsgVtgeyaCKxbE7+fRS74qViiq\n=Gpae\n-----END PGP SIGNATURE-----\n. These vulnerabilities (\"Padding\nOracle on Downgraded Legacy Encryption\" or \"POODLE\", Heartbleed, and\nShellshock) could be exploited remotely to create a Denial of Service (DoS),\nallow unauthorized access, or disclose information. \n\nMitigation Instructions\n\n HP recommends the following mitigation steps to reduce the risk of this\nvulnerability for HP StoreEver ESL G3 Tape Library. Click on \"Support\"\n\n 2. From the pull-down, select \"Drivers \u0026 Downloads\"\n\n 3. In the Find my Product field, enter \"MSL6480\"\n\n 4. Expand the \"HP StoreEver MSL6480 Tape Library \" entry\n\n 5. Select \"HP StoreEver MSL6480 Scalable Base Module\"\n\n 6. Select \"OS Independent\" for the operating system\n\n 7. Expand the \"Firmware Storage Tape\" entry\n\n 8. \n\nNOTE: Versions of HP StoreOnce Backup software prior to 3.11.4 contain the\nvulnerable version of Bash. However, HP is unaware of any method that would\nallow this vulnerability to be exploited on HP StoreOnce Backup systems but\nis providing an updated version of Bash Shell as a precaution. \n\nPlease refer to the RESOLUTION\n section below for a list of impacted products. This bulletin will be revised when the software update is\nreleased. \n\n Note: HP and the switch vendor recommend running an active version of\nFabric OS (FOS) listed on the HP Single Point of Connectivity Knowledge\n(SPOCK) website ( http://h20272.www2.hp.com/ ) and applying the work-around\ninformation provided in the MITIGATION INFORMATION section below to protect\nHP StoreFabric B-series switches from this vulnerability. \n\n Fabric OS (FOS) v7.3.0b (This version will be available soon and this\nbulletin will revised at that time)\n\n The following focused fix FOS versions are available for the previously\nreleased versions and have been renamed to include an additional hexadecimal\ncharacter appended to the FOS version on which it is based:\n\n FOS v7.2.1c1\n FOS v7.2.0d6\n FOS v7.1.2b1\n FOS v7.1.1c1\n FOS v7.1.0cb\n FOS v7.0.2e1\n FOS v7.0.0d1\n FOS v6.4.3f3\n FOS v6.4.2a3\n FOS v6.2.2f9\n\nMITIGATION INFORMATION\n\n HP recommends the following steps to reduce the risk of this vulnerability:\n\n - Place the HP StoreFabric SAN switch and other data center critical\ninfrastructure behind a firewall to disallow access from the Internet. \n - Change all HP StoreFabric switch default account passwords, including\nthe root passwords, from the default factory passwords. \n - Examine the list of accounts, including ones on the switch and those\nexisting on remote authentication servers such as RADIUS, LDAP, and TACAS+,\nto ensure only necessary personnel can gain access to HP StoreFabric FOS\nswitches. Delete guest accounts and temporary accounts created for one-time\nusage needs. \n - Utilize FOS password policy management to strengthen the complexity,\nage, and history requirements of switch account passwords",
"sources": [
{
"db": "NVD",
"id": "CVE-2014-6271"
},
{
"db": "CERT/CC",
"id": "VU#252743"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004410"
},
{
"db": "BID",
"id": "70103"
},
{
"db": "VULMON",
"id": "CVE-2014-6271"
},
{
"db": "PACKETSTORM",
"id": "128764"
},
{
"db": "PACKETSTORM",
"id": "129074"
},
{
"db": "PACKETSTORM",
"id": "130644"
},
{
"db": "PACKETSTORM",
"id": "129069"
},
{
"db": "PACKETSTORM",
"id": "130997"
},
{
"db": "PACKETSTORM",
"id": "128755"
},
{
"db": "PACKETSTORM",
"id": "128509"
},
{
"db": "PACKETSTORM",
"id": "128760"
}
],
"trust": 3.42
},
"exploit_availability": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=39918",
"trust": 2.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2014-6271"
}
]
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2014-6271",
"trust": 3.8
},
{
"db": "CERT/CC",
"id": "VU#252743",
"trust": 2.6
},
{
"db": "JVN",
"id": "JVN55667175",
"trust": 1.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-000126",
"trust": 1.8
},
{
"db": "USCERT",
"id": "TA14-268A",
"trust": 1.8
},
{
"db": "BID",
"id": "70103",
"trust": 1.3
},
{
"db": "SECUNIA",
"id": "60325",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61603",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61703",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61328",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61128",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "59272",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61129",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61676",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61291",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61542",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61700",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61641",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61780",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "60044",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61855",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61485",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "59737",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61816",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61643",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61654",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "62312",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61715",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "60193",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61547",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61442",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61283",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61873",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61565",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "59907",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "62343",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "60947",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61550",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "58200",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61312",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "60055",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "60063",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61471",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "60034",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61503",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61857",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61552",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61313",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61065",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61287",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61188",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "62228",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61633",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "61711",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "60024",
"trust": 1.0
},
{
"db": "SECUNIA",
"id": "60433",
"trust": 1.0
},
{
"db": "PACKETSTORM",
"id": "128573",
"trust": 1.0
},
{
"db": "PACKETSTORM",
"id": "128567",
"trust": 1.0
},
{
"db": "PACKETSTORM",
"id": "137376",
"trust": 1.0
},
{
"db": "PACKETSTORM",
"id": "161107",
"trust": 1.0
},
{
"db": "PACKETSTORM",
"id": "128517",
"trust": 1.0
},
{
"db": "EXPLOIT-DB",
"id": "38849",
"trust": 1.0
},
{
"db": "EXPLOIT-DB",
"id": "34879",
"trust": 1.0
},
{
"db": "EXPLOIT-DB",
"id": "39918",
"trust": 1.0
},
{
"db": "EXPLOIT-DB",
"id": "42938",
"trust": 1.0
},
{
"db": "EXPLOIT-DB",
"id": "40619",
"trust": 1.0
},
{
"db": "EXPLOIT-DB",
"id": "37816",
"trust": 1.0
},
{
"db": "EXPLOIT-DB",
"id": "40938",
"trust": 1.0
},
{
"db": "JUNIPER",
"id": "JSA10673",
"trust": 1.0
},
{
"db": "JUNIPER",
"id": "JSA10648",
"trust": 1.0
},
{
"db": "MCAFEE",
"id": "SB10085",
"trust": 1.0
},
{
"db": "JVN",
"id": "JVNVU97537282",
"trust": 0.8
},
{
"db": "JVN",
"id": "JVNVU97219505",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-15-344-01",
"trust": 0.8
},
{
"db": "ICS CERT",
"id": "ICSA-14-269-01A",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004410",
"trust": 0.8
},
{
"db": "VULMON",
"id": "CVE-2014-6271",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "128764",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "129074",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "130644",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "129069",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "130997",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "128755",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "128509",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "128760",
"trust": 0.1
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#252743"
},
{
"db": "VULMON",
"id": "CVE-2014-6271"
},
{
"db": "BID",
"id": "70103"
},
{
"db": "PACKETSTORM",
"id": "128764"
},
{
"db": "PACKETSTORM",
"id": "129074"
},
{
"db": "PACKETSTORM",
"id": "130644"
},
{
"db": "PACKETSTORM",
"id": "129069"
},
{
"db": "PACKETSTORM",
"id": "130997"
},
{
"db": "PACKETSTORM",
"id": "128755"
},
{
"db": "PACKETSTORM",
"id": "128509"
},
{
"db": "PACKETSTORM",
"id": "128760"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004410"
},
{
"db": "NVD",
"id": "CVE-2014-6271"
}
]
},
"id": "VAR-201409-1156",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.39984949999999997
},
"last_update_date": "2025-12-21T20:24:10.283000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Server/Client Products \u00a0bash Vulnerability (CVE-2014-6271,CVE-2014-7169 other ) About the impact of Fujitsu Fujitsu \u00a0 Security information",
"trust": 0.8,
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"title": "Ubuntu Security Notice: bash vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-2362-1"
},
{
"title": "Debian Security Advisories: DSA-3032-1 bash -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=50d43ccd8bbe4fa0648529a981b20a39"
},
{
"title": "Debian CVElist Bug Report Logs: bash: CVE-2014-7169: Incomplete fix for CVE-2014-6271",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=7a56c10ff83e62f236b0dc330aab6c31"
},
{
"title": "Debian Security Advisories: DSA-3035-1 bash -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=f4f02191845c862da8b42c8e3db24b63"
},
{
"title": "Amazon Linux AMI: ALAS-2014-418",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami\u0026qid=ALAS-2014-418"
},
{
"title": "Red Hat: CVE-2014-6271",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2014-6271"
},
{
"title": "BSY-report",
"trust": 0.1,
"url": "https://github.com/sulsseo/BSY-report "
},
{
"title": "CGIShell",
"trust": 0.1,
"url": "https://github.com/cj1324/CGIShell "
},
{
"title": "Safety-Project-Collection",
"trust": 0.1,
"url": "https://github.com/Bypass007/Safety-Project-Collection "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2014-6271"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004410"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-78",
"trust": 1.0
},
{
"problemtype": "OS Command injection (CWE-78) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-004410"
},
{
"db": "NVD",
"id": "CVE-2014-6271"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.6,
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"
},
{
"trust": 1.8,
"url": "https://access.redhat.com/articles/1200223"
},
{
"trust": 1.8,
"url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
},
{
"trust": 1.8,
"url": "http://support.apple.com/kb/ht6495"
},
{
"trust": 1.8,
"url": "https://kb.bluecoat.com/index?page=content\u0026id=sa82"
},
{
"trust": 1.8,
"url": "http://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20140926-bash"
},
{
"trust": 1.8,
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"trust": 1.8,
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"trust": 1.8,
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10085"
},
{
"trust": 1.8,
"url": "http://support.novell.com/security/cve/cve-2014-6271.html"
},
{
"trust": 1.8,
"url": "http://jvndb.jvn.jp/jvndb/jvndb-2014-000126"
},
{
"trust": 1.8,
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"trust": 1.8,
"url": "http://www.us-cert.gov/ncas/alerts/ta14-268a"
},
{
"trust": 1.8,
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"trust": 1.8,
"url": "http://advisories.mageia.org/mgasa-2014-0388.html"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084"
},
{
"trust": 1.0,
"url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
},
{
"trust": 1.0,
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
},
{
"trust": 1.0,
"url": "https://www.exploit-db.com/exploits/38849/"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61715"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/60034"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61129"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61442"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61780"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61816"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61291"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61603"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61188"
},
{
"trust": 1.0,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"trust": 1.0,
"url": "http://rhn.redhat.com/errata/rhsa-2014-1354.html"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61654"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61312"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html"
},
{
"trust": 1.0,
"url": "https://www.exploit-db.com/exploits/40938/"
},
{
"trust": 1.0,
"url": "https://help.ecostruxureit.com/display/public/uadco8x/struxureware+data+center+operation+software+vulnerability+fixes"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/60063"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61328"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61565"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/60044"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61703"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/62343"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/62312"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61633"
},
{
"trust": 1.0,
"url": "http://www.websense.com/support/article/kbarticle/vulnerabilities-resolved-in-triton-apx-version-8-0"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61313"
},
{
"trust": 1.0,
"url": "http://www.ubuntu.com/usn/usn-2362-1"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"trust": 1.0,
"url": "http://rhn.redhat.com/errata/rhsa-2014-1293.html"
},
{
"trust": 1.0,
"url": "http://packetstormsecurity.com/files/128573/apache-mod_cgi-remote-command-execution.html"
},
{
"trust": 1.0,
"url": "http://rhn.redhat.com/errata/rhsa-2014-1295.html"
},
{
"trust": 1.0,
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=migr-5096315"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021279"
},
{
"trust": 1.0,
"url": "https://www.exploit-db.com/exploits/42938/"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61287"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61283"
},
{
"trust": 1.0,
"url": "https://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10648"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61547"
},
{
"trust": 1.0,
"url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04518183"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021361"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61065"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61471"
},
{
"trust": 1.0,
"url": "https://www.exploit-db.com/exploits/39918/"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61711"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
},
{
"trust": 1.0,
"url": "https://www.exploit-db.com/exploits/40619/"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html"
},
{
"trust": 1.0,
"url": "http://www.securityfocus.com/bid/70103"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61552"
},
{
"trust": 1.0,
"url": "http://rhn.redhat.com/errata/rhsa-2014-1294.html"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
},
{
"trust": 1.0,
"url": "https://support.citrix.com/article/ctx200217"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html"
},
{
"trust": 1.0,
"url": "http://packetstormsecurity.com/files/161107/sonicwall-ssl-vpn-shellshock-remote-code-execution.html"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/60325"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/60947"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447"
},
{
"trust": 1.0,
"url": "http://www.vmware.com/security/advisories/vmsa-2014-0010.html"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"trust": 1.0,
"url": "https://support.hpe.com/hpsc/doc/public/display?doclocale=en_us\u0026docid=emr_na-c04497075"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61873"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/59737"
},
{
"trust": 1.0,
"url": "http://linux.oracle.com/errata/elsa-2014-1294.html"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
},
{
"trust": 1.0,
"url": "http://www.mandriva.com/security/advisories?name=mdvsa-2015:164"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/59272"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61855"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004879"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
},
{
"trust": 1.0,
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
},
{
"trust": 1.0,
"url": "https://www.suse.com/support/shellshock/"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61503"
},
{
"trust": 1.0,
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityalerts"
},
{
"trust": 1.0,
"url": "http://packetstormsecurity.com/files/128517/vmware-security-advisory-2014-0010.html"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61128"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/60024"
},
{
"trust": 1.0,
"url": "http://packetstormsecurity.com/files/128567/ca-technologies-gnu-bash-shellshock.html"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61676"
},
{
"trust": 1.0,
"url": "https://support.citrix.com/article/ctx200223"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/59907"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2"
},
{
"trust": 1.0,
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=cve-2014-6271"
},
{
"trust": 1.0,
"url": "https://support.apple.com/kb/ht6535"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/62228"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004915"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61857"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61485"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61542"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61550"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61643"
},
{
"trust": 1.0,
"url": "http://www.novell.com/support/kb/doc.php?id=7015701"
},
{
"trust": 1.0,
"url": "http://seclists.org/fulldisclosure/2014/oct/0"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/60055"
},
{
"trust": 1.0,
"url": "https://www.exploit-db.com/exploits/34879/"
},
{
"trust": 1.0,
"url": "http://kb.juniper.net/infocenter/index?page=content\u0026id=jsa10673"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/60193"
},
{
"trust": 1.0,
"url": "http://linux.oracle.com/errata/elsa-2014-1293.html"
},
{
"trust": 1.0,
"url": "http://www.novell.com/support/kb/doc.php?id=7015721"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/60433"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
},
{
"trust": 1.0,
"url": "https://access.redhat.com/node/1200223"
},
{
"trust": 1.0,
"url": "https://www.exploit-db.com/exploits/37816/"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004897"
},
{
"trust": 1.0,
"url": "http://jvn.jp/en/jp/jvn55667175/index.html"
},
{
"trust": 1.0,
"url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1s1004898"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61700"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/58200"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
},
{
"trust": 1.0,
"url": "http://packetstormsecurity.com/files/137376/ipfire-bash-environment-variable-injection-shellshock.html"
},
{
"trust": 1.0,
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3t1021272"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
},
{
"trust": 1.0,
"url": "http://secunia.com/advisories/61641"
},
{
"trust": 1.0,
"url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
},
{
"trust": 0.8,
"url": "http://seclists.org/oss-sec/2014/q3/650"
},
{
"trust": 0.8,
"url": "http://seclists.org/oss-sec/2014/q3/688"
},
{
"trust": 0.8,
"url": "http://seclists.org/oss-sec/2014/q3/685"
},
{
"trust": 0.8,
"url": "http://lcamtuf.blogspot.com/2014/09/bash-bug-apply-unofficial-patch-now.html"
},
{
"trust": 0.8,
"url": "https://gist.github.com/anonymous/929d622f3b36b00c0be1"
},
{
"trust": 0.8,
"url": "https://www.dfranke.us/posts/2014-09-27-shell-shock-exploitation-vectors.html"
},
{
"trust": 0.8,
"url": "https://shellshocker.net/#"
},
{
"trust": 0.8,
"url": "https://www.barracuda.com/support/techalerts"
},
{
"trust": 0.8,
"url": "http://www.checkpoint.com/blog/protecting-shellshock/index.html"
},
{
"trust": 0.8,
"url": "http://securityadvisories.dlink.com/security/publication.aspx?name=sap10044"
},
{
"trust": 0.8,
"url": "http://learn.extremenetworks.com/rs/extreme/images/vn-2014-001-%20gnu%20bash%20threats%20-cve-2014-7169%20rev01.pdf"
},
{
"trust": 0.8,
"url": "http://fedoramagazine.org/shellshock-update-bash-packages-that-resolve-cve-2014-6271-and-cve-2014-7169-available/"
},
{
"trust": 0.8,
"url": "http://www.fortiguard.com/advisory/fg-ir-14-030/"
},
{
"trust": 0.8,
"url": "http://www.gentoo.org/security/en/glsa/glsa-201409-09.xml"
},
{
"trust": 0.8,
"url": "http://alerts.hp.com/r?2.1.3kt.2zr.15ee22.l8mgqe..n.ghvs.8f9a.bw89mq%5f%5fdbosfqk0"
},
{
"trust": 0.8,
"url": "http://kb.juniper.net/jsa10648"
},
{
"trust": 0.8,
"url": "http://jpn.nec.com/security-info/av14-003.html"
},
{
"trust": 0.8,
"url": "https://www.suse.com/support/kb/doc.php?id=7015702"
},
{
"trust": 0.8,
"url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.522193"
},
{
"trust": 0.8,
"url": "http://www.ubuntu.com/usn/usn-2362-1/"
},
{
"trust": 0.8,
"url": "http://kb.vmware.com/selfservice/microsites/search.do?language=en_us\u0026cmd=displaykc\u0026externalid=2090740"
},
{
"trust": 0.8,
"url": "http://pkgsrc.se/files.php?messageid=20140925202832.9ad9c98@cvs.netbsd.org"
},
{
"trust": 0.8,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/"
},
{
"trust": 0.8,
"url": "https://h20564.www2.hp.com/portal/site/hpsc/public/kb/secbullarchive/"
},
{
"trust": 0.8,
"url": "http://h41183.www4.hp.com/signup_alerts.php?jumpid=hpsc_secbulletins"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-6271"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu97219505/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/jp/jvn55667175/index.html"
},
{
"trust": 0.8,
"url": "http://jvn.jp/vu/jvnvu97537282/index.html"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-6271"
},
{
"trust": 0.8,
"url": "http://www.ipa.go.jp/security/ciadr/vul/20140926-bash.html"
},
{
"trust": 0.8,
"url": "https://www.jpcert.or.jp/at/2014/at140037.html"
},
{
"trust": 0.8,
"url": "https://cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"trust": 0.8,
"url": "https://ics-cert.us-cert.gov/advisories/icsa-15-344-01"
},
{
"trust": 0.8,
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-14-269-01a"
},
{
"trust": 0.8,
"url": "http://www.aratana.jp/security/detail.php?id=10"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-7169"
},
{
"trust": 0.3,
"url": "http://www.gnu.org/software/bash/"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-6277"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-6278"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-7186"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-7187"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-0224"
},
{
"trust": 0.1,
"url": "http://h20566.www2.hp.com/portal/site/hpsc/template.page/action.pro"
},
{
"trust": 0.1,
"url": "https://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402-vbox.ova"
},
{
"trust": 0.1,
"url": "https://h20529.www2.hp.com/apt/hp-rdacas-14.10-38402.ova"
},
{
"trust": 0.1,
"url": "http://h20564.www2.hp.com/hpsc/swd/public/readindex?sp4ts.oid=5263732\u0026swlango"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2014-3566"
},
{
"trust": 0.1,
"url": "http://h20564.www2.hp.com/hpsc/swd/public/readindex?sp4ts.oid=5331223\u0026swlango"
},
{
"trust": 0.1,
"url": "http://www.hp.com/support/eslg3"
},
{
"trust": 0.1,
"url": "http://www.hp.com"
},
{
"trust": 0.1,
"url": "http://h20272.www2.hp.com/"
}
],
"sources": [
{
"db": "CERT/CC",
"id": "VU#252743"
},
{
"db": "BID",
"id": "70103"
},
{
"db": "PACKETSTORM",
"id": "128764"
},
{
"db": "PACKETSTORM",
"id": "129074"
},
{
"db": "PACKETSTORM",
"id": "130644"
},
{
"db": "PACKETSTORM",
"id": "129069"
},
{
"db": "PACKETSTORM",
"id": "130997"
},
{
"db": "PACKETSTORM",
"id": "128755"
},
{
"db": "PACKETSTORM",
"id": "128509"
},
{
"db": "PACKETSTORM",
"id": "128760"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004410"
},
{
"db": "NVD",
"id": "CVE-2014-6271"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CERT/CC",
"id": "VU#252743"
},
{
"db": "VULMON",
"id": "CVE-2014-6271"
},
{
"db": "BID",
"id": "70103"
},
{
"db": "PACKETSTORM",
"id": "128764"
},
{
"db": "PACKETSTORM",
"id": "129074"
},
{
"db": "PACKETSTORM",
"id": "130644"
},
{
"db": "PACKETSTORM",
"id": "129069"
},
{
"db": "PACKETSTORM",
"id": "130997"
},
{
"db": "PACKETSTORM",
"id": "128755"
},
{
"db": "PACKETSTORM",
"id": "128509"
},
{
"db": "PACKETSTORM",
"id": "128760"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-004410"
},
{
"db": "NVD",
"id": "CVE-2014-6271"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-09-25T00:00:00",
"db": "CERT/CC",
"id": "VU#252743"
},
{
"date": "2014-09-24T00:00:00",
"db": "VULMON",
"id": "CVE-2014-6271"
},
{
"date": "2014-09-24T00:00:00",
"db": "BID",
"id": "70103"
},
{
"date": "2014-10-20T17:57:00",
"db": "PACKETSTORM",
"id": "128764"
},
{
"date": "2014-11-12T18:14:28",
"db": "PACKETSTORM",
"id": "129074"
},
{
"date": "2015-03-05T14:44:00",
"db": "PACKETSTORM",
"id": "130644"
},
{
"date": "2014-11-12T18:13:47",
"db": "PACKETSTORM",
"id": "129069"
},
{
"date": "2015-03-24T17:08:23",
"db": "PACKETSTORM",
"id": "130997"
},
{
"date": "2014-10-20T14:02:00",
"db": "PACKETSTORM",
"id": "128755"
},
{
"date": "2014-10-01T11:11:00",
"db": "PACKETSTORM",
"id": "128509"
},
{
"date": "2014-10-20T17:03:00",
"db": "PACKETSTORM",
"id": "128760"
},
{
"date": "2014-09-29T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-004410"
},
{
"date": "2014-09-24T18:48:04.477000",
"db": "NVD",
"id": "CVE-2014-6271"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2015-04-14T00:00:00",
"db": "CERT/CC",
"id": "VU#252743"
},
{
"date": "2021-11-17T00:00:00",
"db": "VULMON",
"id": "CVE-2014-6271"
},
{
"date": "2016-07-06T14:58:00",
"db": "BID",
"id": "70103"
},
{
"date": "2024-07-17T06:21:00",
"db": "JVNDB",
"id": "JVNDB-2014-004410"
},
{
"date": "2025-10-22T01:15:57.643000",
"db": "NVD",
"id": "CVE-2014-6271"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "network",
"sources": [
{
"db": "BID",
"id": "70103"
}
],
"trust": 0.3
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "GNU Bash shell executes commands in exported functions in environment variables",
"sources": [
{
"db": "CERT/CC",
"id": "VU#252743"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Design Error",
"sources": [
{
"db": "BID",
"id": "70103"
}
],
"trust": 0.3
}
}
GHSA-6HFC-GRWP-2P9C
Vulnerability from github – Published: 2022-05-13 01:05 – Updated: 2025-10-22 03:30GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
{
"affected": [],
"aliases": [
"CVE-2014-6271"
],
"database_specific": {
"cwe_ids": [
"CWE-78"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2014-09-24T18:48:00Z",
"severity": "CRITICAL"
},
"details": "GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka \"ShellShock.\" NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.",
"id": "GHSA-6hfc-grwp-2p9c",
"modified": "2025-10-22T03:30:41Z",
"published": "2022-05-13T01:05:13Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2014-6271"
},
{
"type": "WEB",
"url": "https://www.suse.com/support/shellshock"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/42938"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/40938"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/40619"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/39918"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/38849"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/37816"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/34879"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-6271"
},
{
"type": "WEB",
"url": "https://www.arista.com/en/support/advisories-notices/security-advisories/1008-security-advisory-0006"
},
{
"type": "WEB",
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk102673\u0026src=securityAlerts"
},
{
"type": "WEB",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04518183"
},
{
"type": "WEB",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-c04497075"
},
{
"type": "WEB",
"url": "https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15629.html"
},
{
"type": "WEB",
"url": "https://support.citrix.com/article/CTX200223"
},
{
"type": "WEB",
"url": "https://support.citrix.com/article/CTX200217"
},
{
"type": "WEB",
"url": "https://support.apple.com/kb/HT6535"
},
{
"type": "WEB",
"url": "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack"
},
{
"type": "WEB",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10085"
},
{
"type": "WEB",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10648"
},
{
"type": "WEB",
"url": "https://kb.bluecoat.com/index?page=content\u0026id=SA82"
},
{
"type": "WEB",
"url": "https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1141597"
},
{
"type": "WEB",
"url": "https://access.redhat.com/node/1200223"
},
{
"type": "WEB",
"url": "https://access.redhat.com/articles/1200223"
},
{
"type": "WEB",
"url": "http://advisories.mageia.org/MGASA-2014-0388.html"
},
{
"type": "WEB",
"url": "http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html"
},
{
"type": "WEB",
"url": "http://jvn.jp/en/jp/JVN55667175/index.html"
},
{
"type": "WEB",
"url": "http://jvndb.jvn.jp/jvndb/JVNDB-2014-000126"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10673"
},
{
"type": "WEB",
"url": "http://lcamtuf.blogspot.com/2014/09/quick-notes-about-bash-bug-its-impact.html"
},
{
"type": "WEB",
"url": "http://linux.oracle.com/errata/ELSA-2014-1293.html"
},
{
"type": "WEB",
"url": "http://linux.oracle.com/errata/ELSA-2014-1294.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00028.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00029.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00034.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00037.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00040.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00044.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-09/msg00049.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2014-10/msg00004.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00023.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-updates/2014-10/msg00025.html"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141216207813411\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141216668515282\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141235957116749\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141319209015420\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141330425327438\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141330468527613\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141345648114150\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141383026420882\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141383081521087\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141383138121313\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141383196021590\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141383244821813\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141383304022067\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141383353622268\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141383465822787\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141450491804793\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141576728022234\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141577137423233\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141577241923505\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141577297623641\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141585637922673\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141694386919794\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=141879528318582\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=142113462216480\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=142118135300698\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=142358026505815\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=142358078406056\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=142546741516006\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=142719845423222\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=142721162228379\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=bugtraq\u0026m=142805027510172\u0026w=2"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/128517/VMware-Security-Advisory-2014-0010.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/128567/CA-Technologies-GNU-Bash-Shellshock.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/128573/Apache-mod_cgi-Remote-Command-Execution.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/137376/IPFire-Bash-Environment-Variable-Injection-Shellshock.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/161107/SonicWall-SSL-VPN-Shellshock-Remote-Code-Execution.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1293.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1294.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1295.html"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2014-1354.html"
},
{
"type": "WEB",
"url": "http://seclists.org/fulldisclosure/2014/Oct/0"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/58200"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/59272"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/59737"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/59907"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60024"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60034"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60044"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60055"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60063"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60193"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60325"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60433"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/60947"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61065"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61128"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61129"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61188"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61283"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61287"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61291"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61312"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61313"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61328"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61442"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61471"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61485"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61503"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61542"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61547"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61550"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61552"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61565"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61603"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61633"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61641"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61643"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61654"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61676"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61700"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61703"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61711"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61715"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61780"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61816"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61855"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61857"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/61873"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/62228"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/62312"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/62343"
},
{
"type": "WEB",
"url": "http://support.apple.com/kb/HT6495"
},
{
"type": "WEB",
"url": "http://support.novell.com/security/cve/CVE-2014-6271.html"
},
{
"type": "WEB",
"url": "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140926-bash"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021272"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021279"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=isg3T1021361"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004879"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004897"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004898"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004915"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685541"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685604"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685733"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685749"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21685914"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686084"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686131"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686246"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686445"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686447"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686479"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21686494"
},
{
"type": "WEB",
"url": "http://www-01.ibm.com/support/docview.wss?uid=swg21687079"
},
{
"type": "WEB",
"url": "http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5096315"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2014/dsa-3032"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/252743"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:164"
},
{
"type": "WEB",
"url": "http://www.novell.com/support/kb/doc.php?id=7015701"
},
{
"type": "WEB",
"url": "http://www.novell.com/support/kb/doc.php?id=7015721"
},
{
"type": "WEB",
"url": "http://www.oracle.com/technetwork/topics/security/bashcve-2014-7169-2317675.html"
},
{
"type": "WEB",
"url": "http://www.qnap.com/i/en/support/con_show.php?cid=61"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/533593/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/70103"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/USN-2362-1"
},
{
"type": "WEB",
"url": "http://www.us-cert.gov/ncas/alerts/TA14-268A"
},
{
"type": "WEB",
"url": "http://www.vmware.com/security/advisories/VMSA-2014-0010.html"
},
{
"type": "WEB",
"url": "http://www.websense.com/support/article/kbarticle/Vulnerabilities-resolved-in-TRITON-APX-Version-8-0"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.