Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2017-9217 (GCVE-0-2017-9217)
Vulnerability from cvelistv5 – Published: 2017-05-24 04:56 – Updated: 2024-12-13 13:09
VLAI?
EPSS
Summary
systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-12-13T13:09:19.180Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/systemd/systemd/pull/5998"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://launchpad.net/bugs/1621396"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"name": "98677",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/98677"
},
{
"url": "https://security.netapp.com/advisory/ntap-20241213-0003/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2017-05-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-05-29T09:57:01.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/systemd/systemd/pull/5998"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://launchpad.net/bugs/1621396"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"name": "98677",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/98677"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/systemd/systemd/pull/5998",
"refsource": "CONFIRM",
"url": "https://github.com/systemd/systemd/pull/5998"
},
{
"name": "https://launchpad.net/bugs/1621396",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/1621396"
},
{
"name": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
"refsource": "CONFIRM",
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"name": "98677",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98677"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2017-9217",
"datePublished": "2017-05-24T04:56:00.000Z",
"dateReserved": "2017-05-24T00:00:00.000Z",
"dateUpdated": "2024-12-13T13:09:19.180Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2017-9217\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2017-05-24T05:29:00.223\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.\"},{\"lang\":\"es\",\"value\":\"systemd-resolved hasta la versi\u00f3n 223 permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (daemon crash) mediante una respuesta DNS manipulada con un secci\u00f3n de preguntas vac\u00eda.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-476\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"233\",\"matchCriteriaId\":\"E819026E-9D55-416F-8781-3B8C9C6A1776\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/98677\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/systemd/systemd/pull/5998\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://launchpad.net/bugs/1621396\",\"source\":\"cve@mitre.org\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/98677\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/systemd/systemd/pull/5998\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://launchpad.net/bugs/1621396\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20241213-0003/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTFR-2026-AVI-0281
Vulnerability from certfr_avis - Published: 2026-03-12 - Updated: 2026-03-12
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk AppDynamics Private Synthetic Agent | Splunk AppDynamics Private Synthetic Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk AppDynamics On-Premises Enterprise Console | Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x antérieures à 26.1.1 | ||
| Splunk | Splunk AppDynamics Database Agent | Splunk AppDynamics Database Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.0.2503 antérieures à 10.0.2503.12 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.124 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.9 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.2.x antérieures à 10.2.1 | ||
| Splunk | Splunk AppDynamics NodeJS Agent | Splunk AppDynamics NodeJS Agent versions 25.12.x antérieures à 25.12.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.4 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.10 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.1.2507 antérieures à 10.1.2507.17 | ||
| Splunk | Splunk AppDynamics Java Agent | Splunk AppDynamics Java Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.2.2510 antérieures à 10.2.2510.7 |
References
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk AppDynamics Private Synthetic Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Private Synthetic Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x ant\u00e9rieures \u00e0 26.1.1",
"product": {
"name": "Splunk AppDynamics On-Premises Enterprise Console",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Database Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Database Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.0.2503 ant\u00e9rieures \u00e0 10.0.2503.12",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.124",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.9",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.2.x ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics NodeJS Agent versions 25.12.x ant\u00e9rieures \u00e0 25.12.1",
"product": {
"name": "Splunk AppDynamics NodeJS Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.1.2507 ant\u00e9rieures \u00e0 10.1.2507.17",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Java Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Java Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.2.2510 ant\u00e9rieures \u00e0 10.2.2510.7",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2018-16864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16864"
},
{
"name": "CVE-2025-48073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48073"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-11219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11219"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1594"
},
{
"name": "CVE-2025-3887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3887"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-4574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4574"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12433"
},
{
"name": "CVE-2025-12444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12444"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2025-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11213"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-12036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12036"
},
{
"name": "CVE-2012-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0871"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-0518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0518"
},
{
"name": "CVE-2025-69223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69223"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-12438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12438"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2025-12435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12435"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2013-4394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4394"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2025-64183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64183"
},
{
"name": "CVE-2025-13226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13226"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-47808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47808"
},
{
"name": "CVE-2021-46877",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46877"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2017-18078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18078"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2025-11207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11207"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-13223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13223"
},
{
"name": "CVE-2025-12431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12431"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2024-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7246"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2026-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21226"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2025-12726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12726"
},
{
"name": "CVE-2025-12445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12445"
},
{
"name": "CVE-2025-12437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12437"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2025-69230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69230"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-0716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0716"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-12434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12434"
},
{
"name": "CVE-2025-69225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69225"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-12439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12439"
},
{
"name": "CVE-2018-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16865"
},
{
"name": "CVE-2025-14874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14874"
},
{
"name": "CVE-2020-17521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17521"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2025-48072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48072"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-12432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12432"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2026-20165",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20165"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-22919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22919"
},
{
"name": "CVE-2024-23672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23672"
},
{
"name": "CVE-2025-69227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69227"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-12443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12443"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-6602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6602"
},
{
"name": "CVE-2025-11215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11215"
},
{
"name": "CVE-2013-4393",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4393"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2025-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11205"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-12725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12725"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2025-11208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11208"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-8372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8372"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11756"
},
{
"name": "CVE-2025-59730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59730"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2025-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13033"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11212"
},
{
"name": "CVE-2025-12495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12495"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-12840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12840"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-11458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11458"
},
{
"name": "CVE-2020-1712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1712"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12429"
},
{
"name": "CVE-2026-20164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20164"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-11211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11211"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2023-26118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26118"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-69228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69228"
},
{
"name": "CVE-2025-59250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59250"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-47807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47807"
},
{
"name": "CVE-2025-47806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47806"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-64182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64182"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2023-6604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6604"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2017-9217",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9217"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-64181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64181"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-12436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12436"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2025-13230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13230"
},
{
"name": "CVE-2013-4327",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4327"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-12446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12446"
},
{
"name": "CVE-2025-13228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13228"
},
{
"name": "CVE-2013-4391",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4391"
},
{
"name": "CVE-2026-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20166"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-12441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12441"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2025-47183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47183"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-6601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6601"
},
{
"name": "CVE-2018-16888",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16888"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-69226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69226"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13224"
},
{
"name": "CVE-2025-13042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13042"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2025-11460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11460"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-13229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13229"
},
{
"name": "CVE-2024-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
},
{
"name": "CVE-2025-12440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12440"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-11216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11216"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2018-1049",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1049"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-11210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11210"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2022-31159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31159"
},
{
"name": "CVE-2025-12729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12729"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-13227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13227"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2025-10256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10256"
},
{
"name": "CVE-2026-20162",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20162"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-12839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12839"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-37727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37727"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2019-3844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3844"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-12728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12728"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2023-6605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6605"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2025-12430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12430"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2025-11206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11206"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2018-15686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15686"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9951"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-59729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59729"
},
{
"name": "CVE-2025-48071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48071"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2025-69224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69224"
},
{
"name": "CVE-2025-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2759"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-30153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30153"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-69229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69229"
},
{
"name": "CVE-2024-8373",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8373"
},
{
"name": "CVE-2025-11209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11209"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2024-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21490"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-49501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49501"
},
{
"name": "CVE-2019-3843",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3843"
},
{
"name": "CVE-2018-6954",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6954"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2026-26981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26981"
},
{
"name": "CVE-2025-12447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12447"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2013-4392",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4392"
},
{
"name": "CVE-2025-48074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48074"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2016-7795",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7795"
},
{
"name": "CVE-2025-12727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12727"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-12428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12428"
},
{
"name": "CVE-2026-20163",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20163"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-12T00:00:00",
"last_revision_date": "2026-03-12T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0281",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0302",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0302"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0311",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0311"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0308",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0308"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0309",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0309"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0305",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0305"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0310",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0310"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0304",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0304"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0301",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0301"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0313",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0313"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0306",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0306"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0303",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0303"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0307",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0307"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0312",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0312"
}
]
}
GHSA-PV82-VF69-RQQM
Vulnerability from github – Published: 2022-05-13 01:04 – Updated: 2024-12-13 15:30
VLAI?
Details
systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
Severity ?
7.5 (High)
{
"affected": [],
"aliases": [
"CVE-2017-9217"
],
"database_specific": {
"cwe_ids": [
"CWE-476"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2017-05-24T05:29:00Z",
"severity": "HIGH"
},
"details": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.",
"id": "GHSA-pv82-vf69-rqqm",
"modified": "2024-12-13T15:30:38Z",
"published": "2022-05-13T01:04:11Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-9217"
},
{
"type": "WEB",
"url": "https://github.com/systemd/systemd/pull/5998"
},
{
"type": "WEB",
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"type": "WEB",
"url": "https://launchpad.net/bugs/1621396"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20241213-0003"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/98677"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
FKIE_CVE-2017-9217
Vulnerability from fkie_nvd - Published: 2017-05-24 05:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| systemd_project | systemd | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E819026E-9D55-416F-8781-3B8C9C6A1776",
"versionEndIncluding": "233",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section."
},
{
"lang": "es",
"value": "systemd-resolved hasta la versi\u00f3n 223 permite a los atacantes remotos provocar una denegaci\u00f3n de servicio (daemon crash) mediante una respuesta DNS manipulada con un secci\u00f3n de preguntas vac\u00eda."
}
],
"id": "CVE-2017-9217",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-05-24T05:29:00.223",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/98677"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/systemd/systemd/pull/5998"
},
{
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://launchpad.net/bugs/1621396"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/98677"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/systemd/systemd/pull/5998"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://launchpad.net/bugs/1621396"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20241213-0003/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2017-09921
Vulnerability from cnvd - Published: 2017-06-16
VLAI Severity ?
Title
systemd-resolved拒绝服务漏洞
Description
systemd-resolved是一个用于管理网络名称解析的系统服务。
systemd-resolved 233及之前的版本中存在拒绝服务漏洞。远程攻击者可利用该漏洞借助特制的DNS响应造成拒绝服务(守护进程崩溃)。
Severity
中
Patch Name
systemd-resolved拒绝服务漏洞的补丁
Patch Description
systemd-resolved是一个用于管理网络名称解析的系统服务。
systemd-resolved 233及之前的版本中存在拒绝服务漏洞。远程攻击者可利用该漏洞借助特制的DNS响应造成拒绝服务(守护进程崩溃)。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
用户可参考如下厂商提供的安全补丁以修复该漏洞: https://github.com/systemd/systemd/pull/5998
Reference
https://launchpad.net/bugs/1621396
https://nvd.nist.gov/vuln/detail/CVE-2017-9217
Impacted products
| Name | systemd systemd <=233 |
|---|
{
"bids": {
"bid": {
"bidNumber": "98677"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-9217"
}
},
"description": "systemd-resolved\u662f\u4e00\u4e2a\u7528\u4e8e\u7ba1\u7406\u7f51\u7edc\u540d\u79f0\u89e3\u6790\u7684\u7cfb\u7edf\u670d\u52a1\u3002\r\n\r\nsystemd-resolved 233\u53ca\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u501f\u52a9\u7279\u5236\u7684DNS\u54cd\u5e94\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5b88\u62a4\u8fdb\u7a0b\u5d29\u6e83\uff09\u3002",
"discovererName": "KulykIevgen",
"formalWay": "\u7528\u6237\u53ef\u53c2\u8003\u5982\u4e0b\u5382\u5546\u63d0\u4f9b\u7684\u5b89\u5168\u8865\u4e01\u4ee5\u4fee\u590d\u8be5\u6f0f\u6d1e\uff1a\r\nhttps://github.com/systemd/systemd/pull/5998",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-09921",
"openTime": "2017-06-16",
"patchDescription": "systemd-resolved\u662f\u4e00\u4e2a\u7528\u4e8e\u7ba1\u7406\u7f51\u7edc\u540d\u79f0\u89e3\u6790\u7684\u7cfb\u7edf\u670d\u52a1\u3002\r\n\r\nsystemd-resolved 233\u53ca\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u501f\u52a9\u7279\u5236\u7684DNS\u54cd\u5e94\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5b88\u62a4\u8fdb\u7a0b\u5d29\u6e83\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "systemd-resolved\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "systemd systemd \u003c=233"
},
"referenceLink": "https://launchpad.net/bugs/1621396\r\nhttps://nvd.nist.gov/vuln/detail/CVE-2017-9217",
"serverity": "\u4e2d",
"submitTime": "2017-05-26",
"title": "systemd-resolved\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
SUSE-SU-2017:1773-1
Vulnerability from csaf_suse - Published: 2017-07-04 14:14 - Updated: 2017-07-04 14:14Summary
Security update for systemd
Notes
Title of the patch
Security update for systemd
Description of the patch
This update for systemd fixes the following issues:
Security issue fixed:
- CVE-2017-9217: resolved: Fix null pointer p->question dereferencing that could lead to resolved aborting (bsc#1040614)
The update also fixed several non-security bugs:
- core/mount: Use the '-c' flag to not canonicalize paths when calling /bin/umount
- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)
- automount: Rework propagation between automount and mount units
- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary
- build: Fix systemd-journal-upload installation
- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)
- virt: Make sure some errors are not ignored
- fstab-generator: Do not skip Before= ordering for noauto mountpoints
- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec
- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)
- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)
- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)
- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)
- rules: Export NVMe WWID udev attribute (bsc#1038865)
- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives
- rules: Add rules for NVMe devices
- sysusers: Make group shadow support configurable (bsc#1029516)
- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)
- core: Introduce cg_mask_from_string()/cg_mask_to_string()
- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)
- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)
The database might be missing when upgrading a package which was
shipping no sysv init scripts nor unit files (at the time --save was
called) but the new version start shipping unit files.
- Disable group shadow support (bsc#1029516)
- Only check signature job error if signature job exists (bsc#1043758)
Patchnames
SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1104,SUSE-SLE-DESKTOP-12-SP2-2017-1104,SUSE-SLE-RPI-12-SP2-2017-1104,SUSE-SLE-SDK-12-SP2-2017-1104,SUSE-SLE-SERVER-12-SP2-2017-1104
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for systemd",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for systemd fixes the following issues:\n\nSecurity issue fixed:\n\n- CVE-2017-9217: resolved: Fix null pointer p-\u003equestion dereferencing that could lead to resolved aborting (bsc#1040614)\n\nThe update also fixed several non-security bugs:\n\n- core/mount: Use the \u0027-c\u0027 flag to not canonicalize paths when calling /bin/umount\n- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)\n- automount: Rework propagation between automount and mount units\n- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary\n- build: Fix systemd-journal-upload installation\n- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)\n- virt: Make sure some errors are not ignored\n- fstab-generator: Do not skip Before= ordering for noauto mountpoints\n- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec\n- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)\n- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)\n- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)\n- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)\n- rules: Export NVMe WWID udev attribute (bsc#1038865)\n- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives\n- rules: Add rules for NVMe devices\n- sysusers: Make group shadow support configurable (bsc#1029516)\n- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)\n- core: Introduce cg_mask_from_string()/cg_mask_to_string()\n- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)\n- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)\n The database might be missing when upgrading a package which was\n shipping no sysv init scripts nor unit files (at the time --save was\n called) but the new version start shipping unit files.\n- Disable group shadow support (bsc#1029516)\n- Only check signature job error if signature job exists (bsc#1043758)\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1104,SUSE-SLE-DESKTOP-12-SP2-2017-1104,SUSE-SLE-RPI-12-SP2-2017-1104,SUSE-SLE-SDK-12-SP2-2017-1104,SUSE-SLE-SERVER-12-SP2-2017-1104",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_1773-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:1773-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20171773-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:1773-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-July/003005.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004995",
"url": "https://bugzilla.suse.com/1004995"
},
{
"category": "self",
"summary": "SUSE Bug 1029102",
"url": "https://bugzilla.suse.com/1029102"
},
{
"category": "self",
"summary": "SUSE Bug 1029516",
"url": "https://bugzilla.suse.com/1029516"
},
{
"category": "self",
"summary": "SUSE Bug 1036873",
"url": "https://bugzilla.suse.com/1036873"
},
{
"category": "self",
"summary": "SUSE Bug 1038865",
"url": "https://bugzilla.suse.com/1038865"
},
{
"category": "self",
"summary": "SUSE Bug 1040258",
"url": "https://bugzilla.suse.com/1040258"
},
{
"category": "self",
"summary": "SUSE Bug 1040614",
"url": "https://bugzilla.suse.com/1040614"
},
{
"category": "self",
"summary": "SUSE Bug 1040942",
"url": "https://bugzilla.suse.com/1040942"
},
{
"category": "self",
"summary": "SUSE Bug 1043758",
"url": "https://bugzilla.suse.com/1043758"
},
{
"category": "self",
"summary": "SUSE Bug 982303",
"url": "https://bugzilla.suse.com/982303"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9217 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9217/"
}
],
"title": "Security update for systemd",
"tracking": {
"current_release_date": "2017-07-04T14:14:16Z",
"generator": {
"date": "2017-07-04T14:14:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:1773-1",
"initial_release_date": "2017-07-04T14:14:16Z",
"revision_history": [
{
"date": "2017-07-04T14:14:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-228-149.3.aarch64",
"product": {
"name": "libsystemd0-228-149.3.aarch64",
"product_id": "libsystemd0-228-149.3.aarch64"
}
},
{
"category": "product_version",
"name": "libudev1-228-149.3.aarch64",
"product": {
"name": "libudev1-228-149.3.aarch64",
"product_id": "libudev1-228-149.3.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-228-149.3.aarch64",
"product": {
"name": "systemd-228-149.3.aarch64",
"product_id": "systemd-228-149.3.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-149.3.aarch64",
"product": {
"name": "systemd-sysvinit-228-149.3.aarch64",
"product_id": "systemd-sysvinit-228-149.3.aarch64"
}
},
{
"category": "product_version",
"name": "udev-228-149.3.aarch64",
"product": {
"name": "udev-228-149.3.aarch64",
"product_id": "udev-228-149.3.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-devel-228-149.3.aarch64",
"product": {
"name": "libudev-devel-228-149.3.aarch64",
"product_id": "libudev-devel-228-149.3.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-149.3.aarch64",
"product": {
"name": "systemd-devel-228-149.3.aarch64",
"product_id": "systemd-devel-228-149.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-bash-completion-228-149.3.noarch",
"product": {
"name": "systemd-bash-completion-228-149.3.noarch",
"product_id": "systemd-bash-completion-228-149.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libudev-devel-228-149.3.ppc64le",
"product": {
"name": "libudev-devel-228-149.3.ppc64le",
"product_id": "libudev-devel-228-149.3.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-149.3.ppc64le",
"product": {
"name": "systemd-devel-228-149.3.ppc64le",
"product_id": "systemd-devel-228-149.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libsystemd0-228-149.3.ppc64le",
"product": {
"name": "libsystemd0-228-149.3.ppc64le",
"product_id": "libsystemd0-228-149.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev1-228-149.3.ppc64le",
"product": {
"name": "libudev1-228-149.3.ppc64le",
"product_id": "libudev1-228-149.3.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-228-149.3.ppc64le",
"product": {
"name": "systemd-228-149.3.ppc64le",
"product_id": "systemd-228-149.3.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-149.3.ppc64le",
"product": {
"name": "systemd-sysvinit-228-149.3.ppc64le",
"product_id": "systemd-sysvinit-228-149.3.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-228-149.3.ppc64le",
"product": {
"name": "udev-228-149.3.ppc64le",
"product_id": "udev-228-149.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libudev-devel-228-149.3.s390x",
"product": {
"name": "libudev-devel-228-149.3.s390x",
"product_id": "libudev-devel-228-149.3.s390x"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-149.3.s390x",
"product": {
"name": "systemd-devel-228-149.3.s390x",
"product_id": "systemd-devel-228-149.3.s390x"
}
},
{
"category": "product_version",
"name": "libsystemd0-228-149.3.s390x",
"product": {
"name": "libsystemd0-228-149.3.s390x",
"product_id": "libsystemd0-228-149.3.s390x"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-228-149.3.s390x",
"product": {
"name": "libsystemd0-32bit-228-149.3.s390x",
"product_id": "libsystemd0-32bit-228-149.3.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-228-149.3.s390x",
"product": {
"name": "libudev1-228-149.3.s390x",
"product_id": "libudev1-228-149.3.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-228-149.3.s390x",
"product": {
"name": "libudev1-32bit-228-149.3.s390x",
"product_id": "libudev1-32bit-228-149.3.s390x"
}
},
{
"category": "product_version",
"name": "systemd-228-149.3.s390x",
"product": {
"name": "systemd-228-149.3.s390x",
"product_id": "systemd-228-149.3.s390x"
}
},
{
"category": "product_version",
"name": "systemd-32bit-228-149.3.s390x",
"product": {
"name": "systemd-32bit-228-149.3.s390x",
"product_id": "systemd-32bit-228-149.3.s390x"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-149.3.s390x",
"product": {
"name": "systemd-sysvinit-228-149.3.s390x",
"product_id": "systemd-sysvinit-228-149.3.s390x"
}
},
{
"category": "product_version",
"name": "udev-228-149.3.s390x",
"product": {
"name": "udev-228-149.3.s390x",
"product_id": "udev-228-149.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-228-149.3.x86_64",
"product": {
"name": "libsystemd0-228-149.3.x86_64",
"product_id": "libsystemd0-228-149.3.x86_64"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-228-149.3.x86_64",
"product": {
"name": "libsystemd0-32bit-228-149.3.x86_64",
"product_id": "libsystemd0-32bit-228-149.3.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-228-149.3.x86_64",
"product": {
"name": "libudev1-228-149.3.x86_64",
"product_id": "libudev1-228-149.3.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-228-149.3.x86_64",
"product": {
"name": "libudev1-32bit-228-149.3.x86_64",
"product_id": "libudev1-32bit-228-149.3.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-228-149.3.x86_64",
"product": {
"name": "systemd-228-149.3.x86_64",
"product_id": "systemd-228-149.3.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-32bit-228-149.3.x86_64",
"product": {
"name": "systemd-32bit-228-149.3.x86_64",
"product_id": "systemd-32bit-228-149.3.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-149.3.x86_64",
"product": {
"name": "systemd-sysvinit-228-149.3.x86_64",
"product_id": "systemd-sysvinit-228-149.3.x86_64"
}
},
{
"category": "product_version",
"name": "udev-228-149.3.x86_64",
"product": {
"name": "udev-228-149.3.x86_64",
"product_id": "udev-228-149.3.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-devel-228-149.3.x86_64",
"product": {
"name": "libudev-devel-228-149.3.x86_64",
"product_id": "libudev-devel-228-149.3.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-149.3.x86_64",
"product": {
"name": "systemd-devel-228-149.3.x86_64",
"product_id": "systemd-devel-228-149.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libsystemd0-228-149.3.x86_64"
},
"product_reference": "libsystemd0-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-149.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libsystemd0-32bit-228-149.3.x86_64"
},
"product_reference": "libsystemd0-32bit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libudev1-228-149.3.x86_64"
},
"product_reference": "libudev1-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-149.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:libudev1-32bit-228-149.3.x86_64"
},
"product_reference": "libudev1-32bit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:systemd-228-149.3.x86_64"
},
"product_reference": "systemd-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-149.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:systemd-32bit-228-149.3.x86_64"
},
"product_reference": "systemd-32bit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-149.3.noarch as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:systemd-bash-completion-228-149.3.noarch"
},
"product_reference": "systemd-bash-completion-228-149.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:systemd-sysvinit-228-149.3.x86_64"
},
"product_reference": "systemd-sysvinit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP2",
"product_id": "SUSE Linux Enterprise Desktop 12 SP2:udev-228-149.3.x86_64"
},
"product_reference": "udev-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libsystemd0-228-149.3.aarch64"
},
"product_reference": "libsystemd0-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libudev1-228-149.3.aarch64"
},
"product_reference": "libudev1-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-228-149.3.aarch64"
},
"product_reference": "systemd-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-149.3.noarch as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-bash-completion-228-149.3.noarch"
},
"product_reference": "systemd-bash-completion-228-149.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-sysvinit-228-149.3.aarch64"
},
"product_reference": "systemd-sysvinit-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2",
"product_id": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:udev-228-149.3.aarch64"
},
"product_reference": "udev-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for Raspberry Pi 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-149.3.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.aarch64"
},
"product_reference": "libudev-devel-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-149.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.ppc64le"
},
"product_reference": "libudev-devel-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-149.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.s390x"
},
"product_reference": "libudev-devel-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-149.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.x86_64"
},
"product_reference": "libudev-devel-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-149.3.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.aarch64"
},
"product_reference": "systemd-devel-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-149.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.ppc64le"
},
"product_reference": "systemd-devel-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-149.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.s390x"
},
"product_reference": "systemd-devel-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-149.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP2",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.x86_64"
},
"product_reference": "systemd-devel-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.aarch64"
},
"product_reference": "libsystemd0-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.ppc64le"
},
"product_reference": "libsystemd0-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.s390x"
},
"product_reference": "libsystemd0-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.x86_64"
},
"product_reference": "libsystemd0-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-149.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libsystemd0-32bit-228-149.3.s390x"
},
"product_reference": "libsystemd0-32bit-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-149.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libsystemd0-32bit-228-149.3.x86_64"
},
"product_reference": "libsystemd0-32bit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.aarch64"
},
"product_reference": "libudev1-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.ppc64le"
},
"product_reference": "libudev1-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.s390x"
},
"product_reference": "libudev1-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.x86_64"
},
"product_reference": "libudev1-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-149.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libudev1-32bit-228-149.3.s390x"
},
"product_reference": "libudev1-32bit-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-149.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:libudev1-32bit-228-149.3.x86_64"
},
"product_reference": "libudev1-32bit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.aarch64"
},
"product_reference": "systemd-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.ppc64le"
},
"product_reference": "systemd-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.s390x"
},
"product_reference": "systemd-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.x86_64"
},
"product_reference": "systemd-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-149.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-32bit-228-149.3.s390x"
},
"product_reference": "systemd-32bit-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-149.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-32bit-228-149.3.x86_64"
},
"product_reference": "systemd-32bit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-149.3.noarch as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-bash-completion-228-149.3.noarch"
},
"product_reference": "systemd-bash-completion-228-149.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.aarch64"
},
"product_reference": "systemd-sysvinit-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.ppc64le"
},
"product_reference": "systemd-sysvinit-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.s390x"
},
"product_reference": "systemd-sysvinit-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.x86_64"
},
"product_reference": "systemd-sysvinit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.aarch64"
},
"product_reference": "udev-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.ppc64le"
},
"product_reference": "udev-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.s390x as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.s390x"
},
"product_reference": "udev-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP2",
"product_id": "SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.x86_64"
},
"product_reference": "udev-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.aarch64"
},
"product_reference": "libsystemd0-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.ppc64le"
},
"product_reference": "libsystemd0-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.s390x"
},
"product_reference": "libsystemd0-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-149.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.x86_64"
},
"product_reference": "libsystemd0-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-149.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-149.3.s390x"
},
"product_reference": "libsystemd0-32bit-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-149.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-149.3.x86_64"
},
"product_reference": "libsystemd0-32bit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.aarch64"
},
"product_reference": "libudev1-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.ppc64le"
},
"product_reference": "libudev1-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.s390x"
},
"product_reference": "libudev1-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-149.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.x86_64"
},
"product_reference": "libudev1-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-149.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-149.3.s390x"
},
"product_reference": "libudev1-32bit-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-149.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-149.3.x86_64"
},
"product_reference": "libudev1-32bit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.aarch64"
},
"product_reference": "systemd-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.ppc64le"
},
"product_reference": "systemd-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.s390x"
},
"product_reference": "systemd-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-149.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.x86_64"
},
"product_reference": "systemd-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-149.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-149.3.s390x"
},
"product_reference": "systemd-32bit-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-149.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-149.3.x86_64"
},
"product_reference": "systemd-32bit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-149.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-149.3.noarch"
},
"product_reference": "systemd-bash-completion-228-149.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.aarch64"
},
"product_reference": "systemd-sysvinit-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.ppc64le"
},
"product_reference": "systemd-sysvinit-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.s390x"
},
"product_reference": "systemd-sysvinit-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-149.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.x86_64"
},
"product_reference": "systemd-sysvinit-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.aarch64"
},
"product_reference": "udev-228-149.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.ppc64le"
},
"product_reference": "udev-228-149.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.s390x"
},
"product_reference": "udev-228-149.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-149.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.x86_64"
},
"product_reference": "udev-228-149.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-9217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9217"
}
],
"notes": [
{
"category": "general",
"text": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP2:libsystemd0-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libsystemd0-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libudev1-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libudev1-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-sysvinit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:udev-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libudev1-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libudev1-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:systemd-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:systemd-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libsystemd0-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libudev1-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-sysvinit-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:udev-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9217",
"url": "https://www.suse.com/security/cve/CVE-2017-9217"
},
{
"category": "external",
"summary": "SUSE Bug 1040614 for CVE-2017-9217",
"url": "https://bugzilla.suse.com/1040614"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP2:libsystemd0-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libsystemd0-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libudev1-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libudev1-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-sysvinit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:udev-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libudev1-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libudev1-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:systemd-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:systemd-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libsystemd0-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libudev1-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-sysvinit-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:udev-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP2:libsystemd0-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libsystemd0-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libudev1-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:libudev1-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP2:systemd-sysvinit-228-149.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP2:udev-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libsystemd0-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libudev1-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:libudev1-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:libudev1-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:systemd-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:systemd-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:systemd-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:systemd-sysvinit-228-149.3.x86_64",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.aarch64",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.s390x",
"SUSE Linux Enterprise Server 12 SP2:udev-228-149.3.x86_64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libsystemd0-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:libudev1-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:systemd-sysvinit-228-149.3.aarch64",
"SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:udev-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-149.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-149.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-149.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:libudev-devel-228-149.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP2:systemd-devel-228-149.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-07-04T14:14:16Z",
"details": "low"
}
],
"title": "CVE-2017-9217"
}
]
}
SUSE-SU-2017:2031-1
Vulnerability from csaf_suse - Published: 2017-08-03 08:43 - Updated: 2017-08-03 08:43Summary
Security update for systemd
Notes
Title of the patch
Security update for systemd
Description of the patch
This update for systemd provides several fixes and enhancements.
Security issues fixed:
- CVE-2017-9217: Null pointer dereferencing that could lead to resolved aborting. (bsc#1040614)
- CVE-2017-9445: Possible out-of-bounds write triggered by a specially crafted TCP payload
from a DNS server. (bsc#1045290)
The update also fixed several non-security bugs:
- core/mount: Use the '-c' flag to not canonicalize paths when calling /bin/umount
- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)
- automount: Rework propagation between automount and mount units
- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary
- build: Fix systemd-journal-upload installation
- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)
- virt: Make sure some errors are not ignored
- fstab-generator: Do not skip Before= ordering for noauto mountpoints
- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec
- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)
- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)
- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)
- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)
- rules: Export NVMe WWID udev attribute (bsc#1038865)
- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives
- rules: Add rules for NVMe devices
- sysusers: Make group shadow support configurable (bsc#1029516)
- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)
- core: Introduce cg_mask_from_string()/cg_mask_to_string()
- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)
- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)
The database might be missing when upgrading a package which was
shipping no sysv init scripts nor unit files (at the time --save was
called) but the new version start shipping unit files.
- Disable group shadow support (bsc#1029516)
- Only check signature job error if signature job exists (bsc#1043758)
- Automounter issue in combination with NFS volumes (bsc#1040968)
- Missing symbolic link for SAS device in /dev/disk/by-path (bsc#1040153)
- Add minimal support for boot.d/* scripts in systemd-sysv-convert (bsc#1046750)
Patchnames
SUSE-SLE-DESKTOP-12-SP3-2017-1245,SUSE-SLE-SDK-12-SP3-2017-1245,SUSE-SLE-SERVER-12-SP3-2017-1245
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for systemd",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for systemd provides several fixes and enhancements.\n\nSecurity issues fixed:\n\n- CVE-2017-9217: Null pointer dereferencing that could lead to resolved aborting. (bsc#1040614)\n- CVE-2017-9445: Possible out-of-bounds write triggered by a specially crafted TCP payload\n from a DNS server. (bsc#1045290)\n\nThe update also fixed several non-security bugs:\n\n- core/mount: Use the \u0027-c\u0027 flag to not canonicalize paths when calling /bin/umount\n- automount: Handle expire_tokens when the mount unit changes its state (bsc#1040942)\n- automount: Rework propagation between automount and mount units\n- build: Make sure tmpfiles.d/systemd-remote.conf get installed when necessary\n- build: Fix systemd-journal-upload installation\n- basic: Detect XEN Dom0 as no virtualization (bsc#1036873)\n- virt: Make sure some errors are not ignored\n- fstab-generator: Do not skip Before= ordering for noauto mountpoints\n- fstab-gen: Do not convert device timeout into seconds when initializing JobTimeoutSec\n- core/device: Use JobRunningTimeoutSec= for device units (bsc#1004995)\n- fstab-generator: Apply the _netdev option also to device units (bsc#1004995)\n- job: Add JobRunningTimeoutSec for JOB_RUNNING state (bsc#1004995)\n- job: Ensure JobRunningTimeoutSec= survives serialization (bsc#1004995)\n- rules: Export NVMe WWID udev attribute (bsc#1038865)\n- rules: Introduce disk/by-id (model_serial) symbolic links for NVMe drives\n- rules: Add rules for NVMe devices\n- sysusers: Make group shadow support configurable (bsc#1029516)\n- core: When deserializing a unit, fully restore its cgroup state (bsc#1029102)\n- core: Introduce cg_mask_from_string()/cg_mask_to_string()\n- core:execute: Fix handling failures of calling fork() in exec_spawn() (bsc#1040258)\n- Fix systemd-sysv-convert when a package starts shipping service units (bsc#982303)\n The database might be missing when upgrading a package which was\n shipping no sysv init scripts nor unit files (at the time --save was\n called) but the new version start shipping unit files.\n- Disable group shadow support (bsc#1029516)\n- Only check signature job error if signature job exists (bsc#1043758)\n- Automounter issue in combination with NFS volumes (bsc#1040968)\n- Missing symbolic link for SAS device in /dev/disk/by-path (bsc#1040153)\n- Add minimal support for boot.d/* scripts in systemd-sysv-convert (bsc#1046750)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-DESKTOP-12-SP3-2017-1245,SUSE-SLE-SDK-12-SP3-2017-1245,SUSE-SLE-SERVER-12-SP3-2017-1245",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2017_2031-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2017:2031-1",
"url": "https://www.suse.com/support/update/announcement/2017/suse-su-20172031-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2017:2031-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2017-August/003077.html"
},
{
"category": "self",
"summary": "SUSE Bug 1004995",
"url": "https://bugzilla.suse.com/1004995"
},
{
"category": "self",
"summary": "SUSE Bug 1029102",
"url": "https://bugzilla.suse.com/1029102"
},
{
"category": "self",
"summary": "SUSE Bug 1029516",
"url": "https://bugzilla.suse.com/1029516"
},
{
"category": "self",
"summary": "SUSE Bug 1032029",
"url": "https://bugzilla.suse.com/1032029"
},
{
"category": "self",
"summary": "SUSE Bug 1033238",
"url": "https://bugzilla.suse.com/1033238"
},
{
"category": "self",
"summary": "SUSE Bug 1036873",
"url": "https://bugzilla.suse.com/1036873"
},
{
"category": "self",
"summary": "SUSE Bug 1037120",
"url": "https://bugzilla.suse.com/1037120"
},
{
"category": "self",
"summary": "SUSE Bug 1038865",
"url": "https://bugzilla.suse.com/1038865"
},
{
"category": "self",
"summary": "SUSE Bug 1040153",
"url": "https://bugzilla.suse.com/1040153"
},
{
"category": "self",
"summary": "SUSE Bug 1040258",
"url": "https://bugzilla.suse.com/1040258"
},
{
"category": "self",
"summary": "SUSE Bug 1040614",
"url": "https://bugzilla.suse.com/1040614"
},
{
"category": "self",
"summary": "SUSE Bug 1040942",
"url": "https://bugzilla.suse.com/1040942"
},
{
"category": "self",
"summary": "SUSE Bug 1040968",
"url": "https://bugzilla.suse.com/1040968"
},
{
"category": "self",
"summary": "SUSE Bug 1043758",
"url": "https://bugzilla.suse.com/1043758"
},
{
"category": "self",
"summary": "SUSE Bug 1043900",
"url": "https://bugzilla.suse.com/1043900"
},
{
"category": "self",
"summary": "SUSE Bug 1045290",
"url": "https://bugzilla.suse.com/1045290"
},
{
"category": "self",
"summary": "SUSE Bug 1046750",
"url": "https://bugzilla.suse.com/1046750"
},
{
"category": "self",
"summary": "SUSE Bug 982303",
"url": "https://bugzilla.suse.com/982303"
},
{
"category": "self",
"summary": "SUSE Bug 986216",
"url": "https://bugzilla.suse.com/986216"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9217 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9217/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9445 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9445/"
}
],
"title": "Security update for systemd",
"tracking": {
"current_release_date": "2017-08-03T08:43:31Z",
"generator": {
"date": "2017-08-03T08:43:31Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2017:2031-1",
"initial_release_date": "2017-08-03T08:43:31Z",
"revision_history": [
{
"date": "2017-08-03T08:43:31Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libudev-devel-228-150.9.3.aarch64",
"product": {
"name": "libudev-devel-228-150.9.3.aarch64",
"product_id": "libudev-devel-228-150.9.3.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.9.3.aarch64",
"product": {
"name": "systemd-devel-228-150.9.3.aarch64",
"product_id": "systemd-devel-228-150.9.3.aarch64"
}
},
{
"category": "product_version",
"name": "libsystemd0-228-150.9.3.aarch64",
"product": {
"name": "libsystemd0-228-150.9.3.aarch64",
"product_id": "libsystemd0-228-150.9.3.aarch64"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.9.3.aarch64",
"product": {
"name": "libudev1-228-150.9.3.aarch64",
"product_id": "libudev1-228-150.9.3.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-228-150.9.3.aarch64",
"product": {
"name": "systemd-228-150.9.3.aarch64",
"product_id": "systemd-228-150.9.3.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.9.3.aarch64",
"product": {
"name": "systemd-sysvinit-228-150.9.3.aarch64",
"product_id": "systemd-sysvinit-228-150.9.3.aarch64"
}
},
{
"category": "product_version",
"name": "udev-228-150.9.3.aarch64",
"product": {
"name": "udev-228-150.9.3.aarch64",
"product_id": "udev-228-150.9.3.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-bash-completion-228-150.9.3.noarch",
"product": {
"name": "systemd-bash-completion-228-150.9.3.noarch",
"product_id": "systemd-bash-completion-228-150.9.3.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libudev-devel-228-150.9.3.ppc64le",
"product": {
"name": "libudev-devel-228-150.9.3.ppc64le",
"product_id": "libudev-devel-228-150.9.3.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.9.3.ppc64le",
"product": {
"name": "systemd-devel-228-150.9.3.ppc64le",
"product_id": "systemd-devel-228-150.9.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libsystemd0-228-150.9.3.ppc64le",
"product": {
"name": "libsystemd0-228-150.9.3.ppc64le",
"product_id": "libsystemd0-228-150.9.3.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.9.3.ppc64le",
"product": {
"name": "libudev1-228-150.9.3.ppc64le",
"product_id": "libudev1-228-150.9.3.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-228-150.9.3.ppc64le",
"product": {
"name": "systemd-228-150.9.3.ppc64le",
"product_id": "systemd-228-150.9.3.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.9.3.ppc64le",
"product": {
"name": "systemd-sysvinit-228-150.9.3.ppc64le",
"product_id": "systemd-sysvinit-228-150.9.3.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-228-150.9.3.ppc64le",
"product": {
"name": "udev-228-150.9.3.ppc64le",
"product_id": "udev-228-150.9.3.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libudev-devel-228-150.9.3.s390x",
"product": {
"name": "libudev-devel-228-150.9.3.s390x",
"product_id": "libudev-devel-228-150.9.3.s390x"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.9.3.s390x",
"product": {
"name": "systemd-devel-228-150.9.3.s390x",
"product_id": "systemd-devel-228-150.9.3.s390x"
}
},
{
"category": "product_version",
"name": "libsystemd0-228-150.9.3.s390x",
"product": {
"name": "libsystemd0-228-150.9.3.s390x",
"product_id": "libsystemd0-228-150.9.3.s390x"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-228-150.9.3.s390x",
"product": {
"name": "libsystemd0-32bit-228-150.9.3.s390x",
"product_id": "libsystemd0-32bit-228-150.9.3.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.9.3.s390x",
"product": {
"name": "libudev1-228-150.9.3.s390x",
"product_id": "libudev1-228-150.9.3.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-228-150.9.3.s390x",
"product": {
"name": "libudev1-32bit-228-150.9.3.s390x",
"product_id": "libudev1-32bit-228-150.9.3.s390x"
}
},
{
"category": "product_version",
"name": "systemd-228-150.9.3.s390x",
"product": {
"name": "systemd-228-150.9.3.s390x",
"product_id": "systemd-228-150.9.3.s390x"
}
},
{
"category": "product_version",
"name": "systemd-32bit-228-150.9.3.s390x",
"product": {
"name": "systemd-32bit-228-150.9.3.s390x",
"product_id": "systemd-32bit-228-150.9.3.s390x"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.9.3.s390x",
"product": {
"name": "systemd-sysvinit-228-150.9.3.s390x",
"product_id": "systemd-sysvinit-228-150.9.3.s390x"
}
},
{
"category": "product_version",
"name": "udev-228-150.9.3.s390x",
"product": {
"name": "udev-228-150.9.3.s390x",
"product_id": "udev-228-150.9.3.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-228-150.9.3.x86_64",
"product": {
"name": "libsystemd0-228-150.9.3.x86_64",
"product_id": "libsystemd0-228-150.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-228-150.9.3.x86_64",
"product": {
"name": "libsystemd0-32bit-228-150.9.3.x86_64",
"product_id": "libsystemd0-32bit-228-150.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.9.3.x86_64",
"product": {
"name": "libudev1-228-150.9.3.x86_64",
"product_id": "libudev1-228-150.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-228-150.9.3.x86_64",
"product": {
"name": "libudev1-32bit-228-150.9.3.x86_64",
"product_id": "libudev1-32bit-228-150.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-228-150.9.3.x86_64",
"product": {
"name": "systemd-228-150.9.3.x86_64",
"product_id": "systemd-228-150.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-32bit-228-150.9.3.x86_64",
"product": {
"name": "systemd-32bit-228-150.9.3.x86_64",
"product_id": "systemd-32bit-228-150.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.9.3.x86_64",
"product": {
"name": "systemd-sysvinit-228-150.9.3.x86_64",
"product_id": "systemd-sysvinit-228-150.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "udev-228-150.9.3.x86_64",
"product": {
"name": "udev-228-150.9.3.x86_64",
"product_id": "udev-228-150.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-devel-228-150.9.3.x86_64",
"product": {
"name": "libudev-devel-228-150.9.3.x86_64",
"product_id": "libudev-devel-228-150.9.3.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.9.3.x86_64",
"product": {
"name": "systemd-devel-228-150.9.3.x86_64",
"product_id": "systemd-devel-228-150.9.3.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.9.3.x86_64"
},
"product_reference": "libsystemd0-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.9.3.x86_64"
},
"product_reference": "libudev1-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.9.3.x86_64"
},
"product_reference": "libudev1-32bit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.9.3.x86_64"
},
"product_reference": "systemd-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.9.3.x86_64"
},
"product_reference": "systemd-32bit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.9.3.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.9.3.noarch"
},
"product_reference": "systemd-bash-completion-228-150.9.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.9.3.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.9.3.x86_64"
},
"product_reference": "udev-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.aarch64"
},
"product_reference": "libudev-devel-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.ppc64le"
},
"product_reference": "libudev-devel-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.9.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.s390x"
},
"product_reference": "libudev-devel-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.x86_64"
},
"product_reference": "libudev-devel-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.aarch64"
},
"product_reference": "systemd-devel-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.ppc64le"
},
"product_reference": "systemd-devel-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.9.3.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.s390x"
},
"product_reference": "systemd-devel-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.x86_64"
},
"product_reference": "systemd-devel-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.aarch64"
},
"product_reference": "libsystemd0-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.ppc64le"
},
"product_reference": "libsystemd0-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.9.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.s390x"
},
"product_reference": "libsystemd0-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.x86_64"
},
"product_reference": "libsystemd0-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.9.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.s390x"
},
"product_reference": "libsystemd0-32bit-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.aarch64"
},
"product_reference": "libudev1-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.ppc64le"
},
"product_reference": "libudev1-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.9.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.s390x"
},
"product_reference": "libudev1-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.x86_64"
},
"product_reference": "libudev1-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.9.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.s390x"
},
"product_reference": "libudev1-32bit-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.x86_64"
},
"product_reference": "libudev1-32bit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.aarch64"
},
"product_reference": "systemd-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.ppc64le"
},
"product_reference": "systemd-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.9.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.s390x"
},
"product_reference": "systemd-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.x86_64"
},
"product_reference": "systemd-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.9.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.s390x"
},
"product_reference": "systemd-32bit-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.x86_64"
},
"product_reference": "systemd-32bit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.9.3.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.9.3.noarch"
},
"product_reference": "systemd-bash-completion-228-150.9.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.aarch64"
},
"product_reference": "systemd-sysvinit-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le"
},
"product_reference": "systemd-sysvinit-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.9.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.s390x"
},
"product_reference": "systemd-sysvinit-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.aarch64"
},
"product_reference": "udev-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.ppc64le"
},
"product_reference": "udev-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.9.3.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.s390x"
},
"product_reference": "udev-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.x86_64"
},
"product_reference": "udev-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.aarch64"
},
"product_reference": "libsystemd0-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.ppc64le"
},
"product_reference": "libsystemd0-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.9.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.s390x"
},
"product_reference": "libsystemd0-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.x86_64"
},
"product_reference": "libsystemd0-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.9.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.s390x"
},
"product_reference": "libsystemd0-32bit-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.aarch64"
},
"product_reference": "libudev1-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.ppc64le"
},
"product_reference": "libudev1-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.9.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.s390x"
},
"product_reference": "libudev1-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.x86_64"
},
"product_reference": "libudev1-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.9.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.s390x"
},
"product_reference": "libudev1-32bit-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.x86_64"
},
"product_reference": "libudev1-32bit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.aarch64"
},
"product_reference": "systemd-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.ppc64le"
},
"product_reference": "systemd-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.9.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.s390x"
},
"product_reference": "systemd-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.x86_64"
},
"product_reference": "systemd-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.9.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.s390x"
},
"product_reference": "systemd-32bit-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.x86_64"
},
"product_reference": "systemd-32bit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.9.3.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.9.3.noarch"
},
"product_reference": "systemd-bash-completion-228-150.9.3.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.aarch64"
},
"product_reference": "systemd-sysvinit-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le"
},
"product_reference": "systemd-sysvinit-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.9.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.s390x"
},
"product_reference": "systemd-sysvinit-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.9.3.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.aarch64"
},
"product_reference": "udev-228-150.9.3.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.9.3.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.ppc64le"
},
"product_reference": "udev-228-150.9.3.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.9.3.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.s390x"
},
"product_reference": "udev-228-150.9.3.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.9.3.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.x86_64"
},
"product_reference": "udev-228-150.9.3.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-9217",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9217"
}
],
"notes": [
{
"category": "general",
"text": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9217",
"url": "https://www.suse.com/security/cve/CVE-2017-9217"
},
{
"category": "external",
"summary": "SUSE Bug 1040614 for CVE-2017-9217",
"url": "https://bugzilla.suse.com/1040614"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-03T08:43:31Z",
"details": "low"
}
],
"title": "CVE-2017-9217"
},
{
"cve": "CVE-2017-9445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9445"
}
],
"notes": [
{
"category": "general",
"text": "In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that\u0027s too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that\u0027s too small, and subsequently write arbitrary data beyond the end of it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9445",
"url": "https://www.suse.com/security/cve/CVE-2017-9445"
},
{
"category": "external",
"summary": "SUSE Bug 1045290 for CVE-2017-9445",
"url": "https://bugzilla.suse.com/1045290"
},
{
"category": "external",
"summary": "SUSE Bug 1063249 for CVE-2017-9445",
"url": "https://bugzilla.suse.com/1063249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.9.3.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.9.3.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.9.3.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.9.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2017-08-03T08:43:31Z",
"details": "important"
}
],
"title": "CVE-2017-9445"
}
]
}
GSD-2017-9217
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-9217",
"description": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.",
"id": "GSD-2017-9217",
"references": [
"https://www.suse.com/security/cve/CVE-2017-9217.html",
"https://security.archlinux.org/CVE-2017-9217"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2017-9217"
],
"details": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section.",
"id": "GSD-2017-9217",
"modified": "2023-12-13T01:21:08.016834Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9217",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/systemd/systemd/pull/5998",
"refsource": "CONFIRM",
"url": "https://github.com/systemd/systemd/pull/5998"
},
{
"name": "https://launchpad.net/bugs/1621396",
"refsource": "CONFIRM",
"url": "https://launchpad.net/bugs/1621396"
},
{
"name": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
"refsource": "CONFIRM",
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"name": "98677",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/98677"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "233",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-9217"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "systemd-resolved through 233 allows remote attackers to cause a denial of service (daemon crash) via a crafted DNS response with an empty question section."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://launchpad.net/bugs/1621396",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://launchpad.net/bugs/1621396"
},
{
"name": "https://github.com/systemd/systemd/pull/5998",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/systemd/systemd/pull/5998"
},
{
"name": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://github.com/systemd/systemd/commit/a924f43f30f9c4acaf70618dd2a055f8b0f166be"
},
{
"name": "98677",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/98677"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-01-31T18:09Z",
"publishedDate": "2017-05-24T05:29Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…