Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-3842 (GCVE-0-2019-3842)
Vulnerability from cvelistv5 – Published: 2019-04-09 20:25 – Updated: 2025-06-09 15:47| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| The systemd Project | systemd |
Affected:
v242-rc4
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T19:19:18.556Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"
},
{
"name": "FEDORA-2019-3fa5db9e19",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/"
},
{
"name": "46743",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/46743/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"
},
{
"name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"
},
{
"name": "openSUSE-SU-2019:1450",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"
},
{
"name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"
},
{
"name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2019-3842",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-09T15:47:18.222753Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-09T15:47:28.243Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "systemd",
"vendor": "The systemd Project",
"versions": [
{
"status": "affected",
"version": "v242-rc4"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-285",
"description": "CWE-285",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-29T14:08:37.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"
},
{
"name": "FEDORA-2019-3fa5db9e19",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/"
},
{
"name": "46743",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/46743/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"
},
{
"name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"
},
{
"name": "openSUSE-SU-2019:1450",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"
},
{
"name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"
},
{
"name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-3842",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "systemd",
"version": {
"version_data": [
{
"version_value": "v242-rc4"
}
]
}
}
]
},
"vendor_name": "The systemd Project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"
},
{
"name": "FEDORA-2019-3fa5db9e19",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/"
},
{
"name": "46743",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46743/"
},
{
"name": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"
},
{
"name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"
},
{
"name": "openSUSE-SU-2019:1450",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"
},
{
"name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E"
},
{
"name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2019-3842",
"datePublished": "2019-04-09T20:25:01.000Z",
"dateReserved": "2019-01-03T00:00:00.000Z",
"dateUpdated": "2025-06-09T15:47:28.243Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-3842",
"date": "2026-04-14",
"epss": "0.00098",
"percentile": "0.26856"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-3842\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2019-04-09T21:29:03.443\",\"lastModified\":\"2024-11-21T04:42:40.903\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \\\"allow_active\\\" element rather than \\\"allow_any\\\".\"},{\"lang\":\"es\",\"value\":\"En systemd anterior de la versi\u00f3n v242-rc4, fue encontrado que pam_systemd no sanea apropiadamente el entorno anterior usando la variable XDG_SEAT. Es posible que un atacante, en ciertas configuraciones particulares, establezca una variable de entorno XDG_SEAT que permita comprobar los comandos contra las pol\u00edticas polkit utilizando el elemento \\\"allow_active\\\" en lugar de \\\"allow_any\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.0,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.0,\"impactScore\":5.9}],\"cvssMetricV30\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\",\"baseScore\":4.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.0,\"impactScore\":3.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":4.4,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.4,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-285\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"241\",\"matchCriteriaId\":\"02E0A07B-34D3-403B-A503-CB11C9203FE9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E2ACFB1-6787-47D0-B7F3-CF4F129732A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"22EB9C1F-9101-4AD5-80FD-CB5EA224A13F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A203307-2242-475A-8ADF-3A1D112655D5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142AD0DD-4CF3-4D74-9442-459CE3347E3A\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97A4B8DF-58DA-4AB6-A1F9-331B36409BA3\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.exploit-db.com/exploits/46743/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.exploit-db.com/exploits/46743/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/\", \"name\": \"FEDORA-2019-3fa5db9e19\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\", \"x_transferred\"]}, {\"url\": \"https://www.exploit-db.com/exploits/46743/\", \"name\": \"46743\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\", \"x_transferred\"]}, {\"url\": \"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html\", \"name\": \"[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html\", \"name\": \"openSUSE-SU-2019:1450\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E\", \"name\": \"[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}, {\"url\": \"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E\", \"name\": \"[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T19:19:18.556Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2019-3842\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-09T15:47:18.222753Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-09T15:47:24.316Z\"}}], \"cna\": {\"metrics\": [{\"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 4.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"The systemd Project\", \"product\": \"systemd\", \"versions\": [{\"status\": \"affected\", \"version\": \"v242-rc4\"}]}], \"references\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/\", \"name\": \"FEDORA-2019-3fa5db9e19\", \"tags\": [\"vendor-advisory\", \"x_refsource_FEDORA\"]}, {\"url\": \"https://www.exploit-db.com/exploits/46743/\", \"name\": \"46743\", \"tags\": [\"exploit\", \"x_refsource_EXPLOIT-DB\"]}, {\"url\": \"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html\", \"name\": \"[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html\", \"name\": \"openSUSE-SU-2019:1450\", \"tags\": [\"vendor-advisory\", \"x_refsource_SUSE\"]}, {\"url\": \"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E\", \"name\": \"[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}, {\"url\": \"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E\", \"name\": \"[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8\", \"tags\": [\"mailing-list\", \"x_refsource_MLIST\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \\\"allow_active\\\" element rather than \\\"allow_any\\\".\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-285\", \"description\": \"CWE-285\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2021-06-29T14:08:37.000Z\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": [[{\"version\": \"3.0\", \"vectorString\": \"4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L\"}]]}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"v242-rc4\"}]}, \"product_name\": \"systemd\"}]}, \"vendor_name\": \"The systemd Project\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842\", \"name\": \"https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842\", \"refsource\": \"CONFIRM\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/\", \"name\": \"FEDORA-2019-3fa5db9e19\", \"refsource\": \"FEDORA\"}, {\"url\": \"https://www.exploit-db.com/exploits/46743/\", \"name\": \"46743\", \"refsource\": \"EXPLOIT-DB\"}, {\"url\": \"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html\", \"name\": \"http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html\", \"name\": \"[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update\", \"refsource\": \"MLIST\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html\", \"name\": \"openSUSE-SU-2019:1450\", \"refsource\": \"SUSE\"}, {\"url\": \"https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E\", \"name\": \"[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8\", \"refsource\": \"MLIST\"}, {\"url\": \"https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E\", \"name\": \"[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8\", \"refsource\": \"MLIST\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \\\"allow_active\\\" element rather than \\\"allow_any\\\".\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-285\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2019-3842\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"secalert@redhat.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2019-3842\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-09T15:47:28.243Z\", \"dateReserved\": \"2019-01-03T00:00:00.000Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2019-04-09T20:25:01.000Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
SUSE-SU-2019:1364-2
Vulnerability from csaf_suse - Published: 2019-07-15 13:48 - Updated: 2019-07-15 13:48{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for systemd",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for systemd fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-3842: Fixed a privilege escalation in pam_systemd which could be exploited by a local user (bsc#1132348).\n- CVE-2019-6454: Fixed a denial of service via crafted D-Bus message (bsc#1125352).\n- CVE-2019-3843, CVE-2019-3844: Fixed a privilege escalation where services with DynamicUser could gain new privileges or create SUID/SGID binaries (bsc#1133506, bsc#1133509).\n\nNon-security issued fixed:\n\n- logind: fix killing of scopes (bsc#1125604)\n- namespace: make MountFlags=shared work again (bsc#1124122)\n- rules: load drivers only on \u0027add\u0027 events (bsc#1126056)\n- sysctl: Don\u0027t pass null directive argument to \u0027%s\u0027 (bsc#1121563)\n- systemd-coredump: generate a stack trace of all core dumps and log into the journal (jsc#SLE-5933)\n- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)\n- sd-bus: bump message queue size again (bsc#1132721)\n- Do not automatically online memory on s390x (bsc#1127557)\n- Removed sg.conf (bsc#1036463)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1364,SUSE-SLE-Module-Basesystem-15-SP1-2019-1364,SUSE-SLE-Module-Development-Tools-OBS-15-SP1-2019-1364",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1364-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1364-2",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1364-2",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191364-2.html"
},
{
"category": "self",
"summary": "SUSE Bug 1036463",
"url": "https://bugzilla.suse.com/1036463"
},
{
"category": "self",
"summary": "SUSE Bug 1121563",
"url": "https://bugzilla.suse.com/1121563"
},
{
"category": "self",
"summary": "SUSE Bug 1124122",
"url": "https://bugzilla.suse.com/1124122"
},
{
"category": "self",
"summary": "SUSE Bug 1125352",
"url": "https://bugzilla.suse.com/1125352"
},
{
"category": "self",
"summary": "SUSE Bug 1125604",
"url": "https://bugzilla.suse.com/1125604"
},
{
"category": "self",
"summary": "SUSE Bug 1126056",
"url": "https://bugzilla.suse.com/1126056"
},
{
"category": "self",
"summary": "SUSE Bug 1127557",
"url": "https://bugzilla.suse.com/1127557"
},
{
"category": "self",
"summary": "SUSE Bug 1130230",
"url": "https://bugzilla.suse.com/1130230"
},
{
"category": "self",
"summary": "SUSE Bug 1132348",
"url": "https://bugzilla.suse.com/1132348"
},
{
"category": "self",
"summary": "SUSE Bug 1132400",
"url": "https://bugzilla.suse.com/1132400"
},
{
"category": "self",
"summary": "SUSE Bug 1132721",
"url": "https://bugzilla.suse.com/1132721"
},
{
"category": "self",
"summary": "SUSE Bug 1133506",
"url": "https://bugzilla.suse.com/1133506"
},
{
"category": "self",
"summary": "SUSE Bug 1133509",
"url": "https://bugzilla.suse.com/1133509"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3842 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3843 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3844 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3844/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6454 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6454/"
},
{
"category": "self",
"summary": "SUSE Bug SLE-5933",
"url": "https://bugzilla.suse.com/SLE-5933"
}
],
"title": "Security update for systemd",
"tracking": {
"current_release_date": "2019-07-15T13:48:30Z",
"generator": {
"date": "2019-07-15T13:48:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1364-2",
"initial_release_date": "2019-07-15T13:48:30Z",
"revision_history": [
{
"date": "2019-07-15T13:48:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.aarch64",
"product": {
"name": "libsystemd0-234-24.30.1.aarch64",
"product_id": "libsystemd0-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.aarch64",
"product": {
"name": "libsystemd0-mini-234-24.30.1.aarch64",
"product_id": "libsystemd0-mini-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.aarch64",
"product": {
"name": "libudev-devel-234-24.30.1.aarch64",
"product_id": "libudev-devel-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.aarch64",
"product": {
"name": "libudev-mini-devel-234-24.30.1.aarch64",
"product_id": "libudev-mini-devel-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.aarch64",
"product": {
"name": "libudev-mini1-234-24.30.1.aarch64",
"product_id": "libudev-mini1-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.aarch64",
"product": {
"name": "libudev1-234-24.30.1.aarch64",
"product_id": "libudev1-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.aarch64",
"product": {
"name": "nss-myhostname-234-24.30.1.aarch64",
"product_id": "nss-myhostname-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.aarch64",
"product": {
"name": "nss-mymachines-234-24.30.1.aarch64",
"product_id": "nss-mymachines-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.aarch64",
"product": {
"name": "nss-systemd-234-24.30.1.aarch64",
"product_id": "nss-systemd-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.aarch64",
"product": {
"name": "systemd-234-24.30.1.aarch64",
"product_id": "systemd-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.aarch64",
"product": {
"name": "systemd-container-234-24.30.1.aarch64",
"product_id": "systemd-container-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.aarch64",
"product": {
"name": "systemd-coredump-234-24.30.1.aarch64",
"product_id": "systemd-coredump-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.aarch64",
"product": {
"name": "systemd-devel-234-24.30.1.aarch64",
"product_id": "systemd-devel-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.aarch64",
"product": {
"name": "systemd-logger-234-24.30.1.aarch64",
"product_id": "systemd-logger-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-234-24.30.1.aarch64",
"product_id": "systemd-mini-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.aarch64",
"product_id": "systemd-mini-container-mini-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.aarch64",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-devel-234-24.30.1.aarch64",
"product_id": "systemd-mini-devel-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.aarch64",
"product_id": "systemd-mini-sysvinit-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.aarch64",
"product": {
"name": "systemd-sysvinit-234-24.30.1.aarch64",
"product_id": "systemd-sysvinit-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.aarch64",
"product": {
"name": "udev-234-24.30.1.aarch64",
"product_id": "udev-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.aarch64",
"product": {
"name": "udev-mini-234-24.30.1.aarch64",
"product_id": "udev-mini-234-24.30.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "libsystemd0-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "libsystemd0-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libudev-devel-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "libudev-devel-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "libudev-devel-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libudev1-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "libudev1-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "libudev1-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "systemd-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "systemd-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "systemd-64bit-234-24.30.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.i586",
"product": {
"name": "libsystemd0-234-24.30.1.i586",
"product_id": "libsystemd0-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.i586",
"product": {
"name": "libsystemd0-mini-234-24.30.1.i586",
"product_id": "libsystemd0-mini-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.i586",
"product": {
"name": "libudev-devel-234-24.30.1.i586",
"product_id": "libudev-devel-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.i586",
"product": {
"name": "libudev-mini-devel-234-24.30.1.i586",
"product_id": "libudev-mini-devel-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.i586",
"product": {
"name": "libudev-mini1-234-24.30.1.i586",
"product_id": "libudev-mini1-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.i586",
"product": {
"name": "libudev1-234-24.30.1.i586",
"product_id": "libudev1-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.i586",
"product": {
"name": "nss-myhostname-234-24.30.1.i586",
"product_id": "nss-myhostname-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.i586",
"product": {
"name": "nss-mymachines-234-24.30.1.i586",
"product_id": "nss-mymachines-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.i586",
"product": {
"name": "nss-systemd-234-24.30.1.i586",
"product_id": "nss-systemd-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.i586",
"product": {
"name": "systemd-234-24.30.1.i586",
"product_id": "systemd-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.i586",
"product": {
"name": "systemd-container-234-24.30.1.i586",
"product_id": "systemd-container-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.i586",
"product": {
"name": "systemd-coredump-234-24.30.1.i586",
"product_id": "systemd-coredump-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.i586",
"product": {
"name": "systemd-devel-234-24.30.1.i586",
"product_id": "systemd-devel-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.i586",
"product": {
"name": "systemd-logger-234-24.30.1.i586",
"product_id": "systemd-logger-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.i586",
"product": {
"name": "systemd-mini-234-24.30.1.i586",
"product_id": "systemd-mini-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.i586",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.i586",
"product_id": "systemd-mini-container-mini-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.i586",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.i586",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.i586",
"product": {
"name": "systemd-mini-devel-234-24.30.1.i586",
"product_id": "systemd-mini-devel-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.i586",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.i586",
"product_id": "systemd-mini-sysvinit-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.i586",
"product": {
"name": "systemd-sysvinit-234-24.30.1.i586",
"product_id": "systemd-sysvinit-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.i586",
"product": {
"name": "udev-234-24.30.1.i586",
"product_id": "udev-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.i586",
"product": {
"name": "udev-mini-234-24.30.1.i586",
"product_id": "udev-mini-234-24.30.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-bash-completion-234-24.30.1.noarch",
"product": {
"name": "systemd-bash-completion-234-24.30.1.noarch",
"product_id": "systemd-bash-completion-234-24.30.1.noarch"
}
},
{
"category": "product_version",
"name": "systemd-mini-bash-completion-234-24.30.1.noarch",
"product": {
"name": "systemd-mini-bash-completion-234-24.30.1.noarch",
"product_id": "systemd-mini-bash-completion-234-24.30.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.ppc64le",
"product": {
"name": "libsystemd0-234-24.30.1.ppc64le",
"product_id": "libsystemd0-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.ppc64le",
"product": {
"name": "libsystemd0-mini-234-24.30.1.ppc64le",
"product_id": "libsystemd0-mini-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.ppc64le",
"product": {
"name": "libudev-devel-234-24.30.1.ppc64le",
"product_id": "libudev-devel-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.ppc64le",
"product": {
"name": "libudev-mini-devel-234-24.30.1.ppc64le",
"product_id": "libudev-mini-devel-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.ppc64le",
"product": {
"name": "libudev-mini1-234-24.30.1.ppc64le",
"product_id": "libudev-mini1-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.ppc64le",
"product": {
"name": "libudev1-234-24.30.1.ppc64le",
"product_id": "libudev1-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.ppc64le",
"product": {
"name": "nss-myhostname-234-24.30.1.ppc64le",
"product_id": "nss-myhostname-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.ppc64le",
"product": {
"name": "nss-mymachines-234-24.30.1.ppc64le",
"product_id": "nss-mymachines-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.ppc64le",
"product": {
"name": "nss-systemd-234-24.30.1.ppc64le",
"product_id": "nss-systemd-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.ppc64le",
"product": {
"name": "systemd-234-24.30.1.ppc64le",
"product_id": "systemd-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.ppc64le",
"product": {
"name": "systemd-container-234-24.30.1.ppc64le",
"product_id": "systemd-container-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.ppc64le",
"product": {
"name": "systemd-coredump-234-24.30.1.ppc64le",
"product_id": "systemd-coredump-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.ppc64le",
"product": {
"name": "systemd-devel-234-24.30.1.ppc64le",
"product_id": "systemd-devel-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.ppc64le",
"product": {
"name": "systemd-logger-234-24.30.1.ppc64le",
"product_id": "systemd-logger-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-234-24.30.1.ppc64le",
"product_id": "systemd-mini-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.ppc64le",
"product_id": "systemd-mini-container-mini-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.ppc64le",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-devel-234-24.30.1.ppc64le",
"product_id": "systemd-mini-devel-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.ppc64le",
"product_id": "systemd-mini-sysvinit-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.ppc64le",
"product": {
"name": "systemd-sysvinit-234-24.30.1.ppc64le",
"product_id": "systemd-sysvinit-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.ppc64le",
"product": {
"name": "udev-234-24.30.1.ppc64le",
"product_id": "udev-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.ppc64le",
"product": {
"name": "udev-mini-234-24.30.1.ppc64le",
"product_id": "udev-mini-234-24.30.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.s390x",
"product": {
"name": "libsystemd0-234-24.30.1.s390x",
"product_id": "libsystemd0-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.s390x",
"product": {
"name": "libsystemd0-mini-234-24.30.1.s390x",
"product_id": "libsystemd0-mini-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.s390x",
"product": {
"name": "libudev-devel-234-24.30.1.s390x",
"product_id": "libudev-devel-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.s390x",
"product": {
"name": "libudev-mini-devel-234-24.30.1.s390x",
"product_id": "libudev-mini-devel-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.s390x",
"product": {
"name": "libudev-mini1-234-24.30.1.s390x",
"product_id": "libudev-mini1-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.s390x",
"product": {
"name": "libudev1-234-24.30.1.s390x",
"product_id": "libudev1-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.s390x",
"product": {
"name": "nss-myhostname-234-24.30.1.s390x",
"product_id": "nss-myhostname-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.s390x",
"product": {
"name": "nss-mymachines-234-24.30.1.s390x",
"product_id": "nss-mymachines-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.s390x",
"product": {
"name": "nss-systemd-234-24.30.1.s390x",
"product_id": "nss-systemd-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.s390x",
"product": {
"name": "systemd-234-24.30.1.s390x",
"product_id": "systemd-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.s390x",
"product": {
"name": "systemd-container-234-24.30.1.s390x",
"product_id": "systemd-container-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.s390x",
"product": {
"name": "systemd-coredump-234-24.30.1.s390x",
"product_id": "systemd-coredump-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.s390x",
"product": {
"name": "systemd-devel-234-24.30.1.s390x",
"product_id": "systemd-devel-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.s390x",
"product": {
"name": "systemd-logger-234-24.30.1.s390x",
"product_id": "systemd-logger-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-234-24.30.1.s390x",
"product_id": "systemd-mini-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.s390x",
"product_id": "systemd-mini-container-mini-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.s390x",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-devel-234-24.30.1.s390x",
"product_id": "systemd-mini-devel-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.s390x",
"product_id": "systemd-mini-sysvinit-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.s390x",
"product": {
"name": "systemd-sysvinit-234-24.30.1.s390x",
"product_id": "systemd-sysvinit-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.s390x",
"product": {
"name": "udev-234-24.30.1.s390x",
"product_id": "udev-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.s390x",
"product": {
"name": "udev-mini-234-24.30.1.s390x",
"product_id": "udev-mini-234-24.30.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.x86_64",
"product": {
"name": "libsystemd0-234-24.30.1.x86_64",
"product_id": "libsystemd0-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-234-24.30.1.x86_64",
"product": {
"name": "libsystemd0-32bit-234-24.30.1.x86_64",
"product_id": "libsystemd0-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.x86_64",
"product": {
"name": "libsystemd0-mini-234-24.30.1.x86_64",
"product_id": "libsystemd0-mini-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.x86_64",
"product": {
"name": "libudev-devel-234-24.30.1.x86_64",
"product_id": "libudev-devel-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-devel-32bit-234-24.30.1.x86_64",
"product": {
"name": "libudev-devel-32bit-234-24.30.1.x86_64",
"product_id": "libudev-devel-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.x86_64",
"product": {
"name": "libudev-mini-devel-234-24.30.1.x86_64",
"product_id": "libudev-mini-devel-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.x86_64",
"product": {
"name": "libudev-mini1-234-24.30.1.x86_64",
"product_id": "libudev-mini1-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.x86_64",
"product": {
"name": "libudev1-234-24.30.1.x86_64",
"product_id": "libudev1-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-234-24.30.1.x86_64",
"product": {
"name": "libudev1-32bit-234-24.30.1.x86_64",
"product_id": "libudev1-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.x86_64",
"product": {
"name": "nss-myhostname-234-24.30.1.x86_64",
"product_id": "nss-myhostname-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-32bit-234-24.30.1.x86_64",
"product": {
"name": "nss-myhostname-32bit-234-24.30.1.x86_64",
"product_id": "nss-myhostname-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.x86_64",
"product": {
"name": "nss-mymachines-234-24.30.1.x86_64",
"product_id": "nss-mymachines-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-32bit-234-24.30.1.x86_64",
"product": {
"name": "nss-mymachines-32bit-234-24.30.1.x86_64",
"product_id": "nss-mymachines-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.x86_64",
"product": {
"name": "nss-systemd-234-24.30.1.x86_64",
"product_id": "nss-systemd-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.x86_64",
"product": {
"name": "systemd-234-24.30.1.x86_64",
"product_id": "systemd-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-32bit-234-24.30.1.x86_64",
"product": {
"name": "systemd-32bit-234-24.30.1.x86_64",
"product_id": "systemd-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.x86_64",
"product": {
"name": "systemd-container-234-24.30.1.x86_64",
"product_id": "systemd-container-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.x86_64",
"product": {
"name": "systemd-coredump-234-24.30.1.x86_64",
"product_id": "systemd-coredump-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.x86_64",
"product": {
"name": "systemd-devel-234-24.30.1.x86_64",
"product_id": "systemd-devel-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.x86_64",
"product": {
"name": "systemd-logger-234-24.30.1.x86_64",
"product_id": "systemd-logger-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-234-24.30.1.x86_64",
"product_id": "systemd-mini-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.x86_64",
"product_id": "systemd-mini-container-mini-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.x86_64",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-devel-234-24.30.1.x86_64",
"product_id": "systemd-mini-devel-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.x86_64",
"product_id": "systemd-mini-sysvinit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.x86_64",
"product": {
"name": "systemd-sysvinit-234-24.30.1.x86_64",
"product_id": "systemd-sysvinit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.x86_64",
"product": {
"name": "udev-234-24.30.1.x86_64",
"product_id": "udev-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.x86_64",
"product": {
"name": "udev-mini-234-24.30.1.x86_64",
"product_id": "udev-mini-234-24.30.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64"
},
"product_reference": "libsystemd0-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le"
},
"product_reference": "libsystemd0-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x"
},
"product_reference": "libsystemd0-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64"
},
"product_reference": "libsystemd0-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64"
},
"product_reference": "libsystemd0-32bit-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64"
},
"product_reference": "libudev-devel-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le"
},
"product_reference": "libudev-devel-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x"
},
"product_reference": "libudev-devel-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64"
},
"product_reference": "libudev-devel-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64"
},
"product_reference": "libudev1-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le"
},
"product_reference": "libudev1-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x"
},
"product_reference": "libudev1-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64"
},
"product_reference": "libudev1-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64"
},
"product_reference": "libudev1-32bit-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64"
},
"product_reference": "systemd-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le"
},
"product_reference": "systemd-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x"
},
"product_reference": "systemd-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64"
},
"product_reference": "systemd-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64"
},
"product_reference": "systemd-32bit-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-234-24.30.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch"
},
"product_reference": "systemd-bash-completion-234-24.30.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64"
},
"product_reference": "systemd-container-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le"
},
"product_reference": "systemd-container-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x"
},
"product_reference": "systemd-container-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64"
},
"product_reference": "systemd-container-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64"
},
"product_reference": "systemd-coredump-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le"
},
"product_reference": "systemd-coredump-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x"
},
"product_reference": "systemd-coredump-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64"
},
"product_reference": "systemd-coredump-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64"
},
"product_reference": "systemd-devel-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le"
},
"product_reference": "systemd-devel-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x"
},
"product_reference": "systemd-devel-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64"
},
"product_reference": "systemd-devel-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64"
},
"product_reference": "systemd-sysvinit-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le"
},
"product_reference": "systemd-sysvinit-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x"
},
"product_reference": "systemd-sysvinit-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64"
},
"product_reference": "systemd-sysvinit-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64"
},
"product_reference": "udev-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le"
},
"product_reference": "udev-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x"
},
"product_reference": "udev-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP1",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
},
"product_reference": "udev-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3842"
}
],
"notes": [
{
"category": "general",
"text": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3842",
"url": "https://www.suse.com/security/cve/CVE-2019-3842"
},
{
"category": "external",
"summary": "SUSE Bug 1132348 for CVE-2019-3842",
"url": "https://bugzilla.suse.com/1132348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-15T13:48:30Z",
"details": "moderate"
}
],
"title": "CVE-2019-3842"
},
{
"cve": "CVE-2019-3843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3843"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3843",
"url": "https://www.suse.com/security/cve/CVE-2019-3843"
},
{
"category": "external",
"summary": "SUSE Bug 1133506 for CVE-2019-3843",
"url": "https://bugzilla.suse.com/1133506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-15T13:48:30Z",
"details": "moderate"
}
],
"title": "CVE-2019-3843"
},
{
"cve": "CVE-2019-3844",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3844"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3844",
"url": "https://www.suse.com/security/cve/CVE-2019-3844"
},
{
"category": "external",
"summary": "SUSE Bug 1133509 for CVE-2019-3844",
"url": "https://bugzilla.suse.com/1133509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-15T13:48:30Z",
"details": "moderate"
}
],
"title": "CVE-2019-3844"
},
{
"cve": "CVE-2019-6454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6454"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6454",
"url": "https://www.suse.com/security/cve/CVE-2019-6454"
},
{
"category": "external",
"summary": "SUSE Bug 1125352 for CVE-2019-6454",
"url": "https://bugzilla.suse.com/1125352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP1:udev-234-24.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-07-15T13:48:30Z",
"details": "important"
}
],
"title": "CVE-2019-6454"
}
]
}
SUSE-SU-2019:1265-1
Vulnerability from csaf_suse - Published: 2019-05-16 07:53 - Updated: 2019-05-16 07:53| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for systemd",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for systemd fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2018-6954: Fixed a vulnerability in the symlink handling of systemd-tmpfiles \n which allowed a local user to obtain ownership of arbitrary files (bsc#1080919).\n- CVE-2019-3842: Fixed a vulnerability in pam_systemd which allowed a local user to escalate privileges (bsc#1132348).\n- CVE-2019-6454: Fixed a denial of service caused by long dbus messages (bsc#1125352).\n\nNon-security issues fixed:\n\n- systemd-coredump: generate a stack trace of all core dumps (jsc#SLE-5933)\n- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)\n- sd-bus: bump message queue size again (bsc#1132721)\n- core: only watch processes when it\u0027s really necessary (bsc#955942 bsc#1128657)\n- rules: load drivers only on \u0027add\u0027 events (bsc#1126056)\n- sysctl: Don\u0027t pass null directive argument to \u0027%s\u0027 (bsc#1121563)\n- Do not automatically online memory on s390x (bsc#1127557)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1265,SUSE-OpenStack-Cloud-7-2019-1265,SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2019-1265,SUSE-SLE-DESKTOP-12-SP3-2019-1265,SUSE-SLE-DESKTOP-12-SP4-2019-1265,SUSE-SLE-SAP-12-SP2-2019-1265,SUSE-SLE-SDK-12-SP3-2019-1265,SUSE-SLE-SDK-12-SP4-2019-1265,SUSE-SLE-SERVER-12-SP2-2019-1265,SUSE-SLE-SERVER-12-SP2-BCL-2019-1265,SUSE-SLE-SERVER-12-SP3-2019-1265,SUSE-SLE-SERVER-12-SP4-2019-1265,SUSE-Storage-4-2019-1265",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1265-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1265-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191265-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1265-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005467.html"
},
{
"category": "self",
"summary": "SUSE Bug 1080919",
"url": "https://bugzilla.suse.com/1080919"
},
{
"category": "self",
"summary": "SUSE Bug 1121563",
"url": "https://bugzilla.suse.com/1121563"
},
{
"category": "self",
"summary": "SUSE Bug 1125352",
"url": "https://bugzilla.suse.com/1125352"
},
{
"category": "self",
"summary": "SUSE Bug 1126056",
"url": "https://bugzilla.suse.com/1126056"
},
{
"category": "self",
"summary": "SUSE Bug 1127557",
"url": "https://bugzilla.suse.com/1127557"
},
{
"category": "self",
"summary": "SUSE Bug 1128657",
"url": "https://bugzilla.suse.com/1128657"
},
{
"category": "self",
"summary": "SUSE Bug 1130230",
"url": "https://bugzilla.suse.com/1130230"
},
{
"category": "self",
"summary": "SUSE Bug 1132348",
"url": "https://bugzilla.suse.com/1132348"
},
{
"category": "self",
"summary": "SUSE Bug 1132400",
"url": "https://bugzilla.suse.com/1132400"
},
{
"category": "self",
"summary": "SUSE Bug 1132721",
"url": "https://bugzilla.suse.com/1132721"
},
{
"category": "self",
"summary": "SUSE Bug 955942",
"url": "https://bugzilla.suse.com/955942"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6954 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3842 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6454 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6454/"
},
{
"category": "self",
"summary": "SUSE Bug SLE-5933",
"url": "https://bugzilla.suse.com/SLE-5933"
}
],
"title": "Security update for systemd",
"tracking": {
"current_release_date": "2019-05-16T07:53:09Z",
"generator": {
"date": "2019-05-16T07:53:09Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1265-1",
"initial_release_date": "2019-05-16T07:53:09Z",
"revision_history": [
{
"date": "2019-05-16T07:53:09Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-228-150.66.4.aarch64",
"product": {
"name": "libsystemd0-228-150.66.4.aarch64",
"product_id": "libsystemd0-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-228-150.66.2.aarch64",
"product": {
"name": "libsystemd0-mini-228-150.66.2.aarch64",
"product_id": "libsystemd0-mini-228-150.66.2.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-devel-228-150.66.4.aarch64",
"product": {
"name": "libudev-devel-228-150.66.4.aarch64",
"product_id": "libudev-devel-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-228-150.66.2.aarch64",
"product": {
"name": "libudev-mini-devel-228-150.66.2.aarch64",
"product_id": "libudev-mini-devel-228-150.66.2.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-mini1-228-150.66.2.aarch64",
"product": {
"name": "libudev-mini1-228-150.66.2.aarch64",
"product_id": "libudev-mini1-228-150.66.2.aarch64"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.66.4.aarch64",
"product": {
"name": "libudev1-228-150.66.4.aarch64",
"product_id": "libudev1-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-228-150.66.4.aarch64",
"product": {
"name": "nss-myhostname-228-150.66.4.aarch64",
"product_id": "nss-myhostname-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-228-150.66.4.aarch64",
"product": {
"name": "nss-mymachines-228-150.66.4.aarch64",
"product_id": "nss-mymachines-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-228-150.66.4.aarch64",
"product": {
"name": "systemd-228-150.66.4.aarch64",
"product_id": "systemd-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.66.4.aarch64",
"product": {
"name": "systemd-devel-228-150.66.4.aarch64",
"product_id": "systemd-devel-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-logger-228-150.66.4.aarch64",
"product": {
"name": "systemd-logger-228-150.66.4.aarch64",
"product_id": "systemd-logger-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-228-150.66.2.aarch64",
"product": {
"name": "systemd-mini-228-150.66.2.aarch64",
"product_id": "systemd-mini-228-150.66.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-228-150.66.2.aarch64",
"product": {
"name": "systemd-mini-devel-228-150.66.2.aarch64",
"product_id": "systemd-mini-devel-228-150.66.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-228-150.66.2.aarch64",
"product": {
"name": "systemd-mini-sysvinit-228-150.66.2.aarch64",
"product_id": "systemd-mini-sysvinit-228-150.66.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.66.4.aarch64",
"product": {
"name": "systemd-sysvinit-228-150.66.4.aarch64",
"product_id": "systemd-sysvinit-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "udev-228-150.66.4.aarch64",
"product": {
"name": "udev-228-150.66.4.aarch64",
"product_id": "udev-228-150.66.4.aarch64"
}
},
{
"category": "product_version",
"name": "udev-mini-228-150.66.2.aarch64",
"product": {
"name": "udev-mini-228-150.66.2.aarch64",
"product_id": "udev-mini-228-150.66.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-64bit-228-150.66.4.aarch64_ilp32",
"product": {
"name": "libsystemd0-64bit-228-150.66.4.aarch64_ilp32",
"product_id": "libsystemd0-64bit-228-150.66.4.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libudev1-64bit-228-150.66.4.aarch64_ilp32",
"product": {
"name": "libudev1-64bit-228-150.66.4.aarch64_ilp32",
"product_id": "libudev1-64bit-228-150.66.4.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "nss-myhostname-64bit-228-150.66.4.aarch64_ilp32",
"product": {
"name": "nss-myhostname-64bit-228-150.66.4.aarch64_ilp32",
"product_id": "nss-myhostname-64bit-228-150.66.4.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "systemd-64bit-228-150.66.4.aarch64_ilp32",
"product": {
"name": "systemd-64bit-228-150.66.4.aarch64_ilp32",
"product_id": "systemd-64bit-228-150.66.4.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-228-150.66.4.i586",
"product": {
"name": "libsystemd0-228-150.66.4.i586",
"product_id": "libsystemd0-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-228-150.66.2.i586",
"product": {
"name": "libsystemd0-mini-228-150.66.2.i586",
"product_id": "libsystemd0-mini-228-150.66.2.i586"
}
},
{
"category": "product_version",
"name": "libudev-devel-228-150.66.4.i586",
"product": {
"name": "libudev-devel-228-150.66.4.i586",
"product_id": "libudev-devel-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-228-150.66.2.i586",
"product": {
"name": "libudev-mini-devel-228-150.66.2.i586",
"product_id": "libudev-mini-devel-228-150.66.2.i586"
}
},
{
"category": "product_version",
"name": "libudev-mini1-228-150.66.2.i586",
"product": {
"name": "libudev-mini1-228-150.66.2.i586",
"product_id": "libudev-mini1-228-150.66.2.i586"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.66.4.i586",
"product": {
"name": "libudev1-228-150.66.4.i586",
"product_id": "libudev1-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "nss-myhostname-228-150.66.4.i586",
"product": {
"name": "nss-myhostname-228-150.66.4.i586",
"product_id": "nss-myhostname-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "nss-mymachines-228-150.66.4.i586",
"product": {
"name": "nss-mymachines-228-150.66.4.i586",
"product_id": "nss-mymachines-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "systemd-228-150.66.4.i586",
"product": {
"name": "systemd-228-150.66.4.i586",
"product_id": "systemd-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.66.4.i586",
"product": {
"name": "systemd-devel-228-150.66.4.i586",
"product_id": "systemd-devel-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "systemd-logger-228-150.66.4.i586",
"product": {
"name": "systemd-logger-228-150.66.4.i586",
"product_id": "systemd-logger-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-228-150.66.2.i586",
"product": {
"name": "systemd-mini-228-150.66.2.i586",
"product_id": "systemd-mini-228-150.66.2.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-228-150.66.2.i586",
"product": {
"name": "systemd-mini-devel-228-150.66.2.i586",
"product_id": "systemd-mini-devel-228-150.66.2.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-228-150.66.2.i586",
"product": {
"name": "systemd-mini-sysvinit-228-150.66.2.i586",
"product_id": "systemd-mini-sysvinit-228-150.66.2.i586"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.66.4.i586",
"product": {
"name": "systemd-sysvinit-228-150.66.4.i586",
"product_id": "systemd-sysvinit-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "udev-228-150.66.4.i586",
"product": {
"name": "udev-228-150.66.4.i586",
"product_id": "udev-228-150.66.4.i586"
}
},
{
"category": "product_version",
"name": "udev-mini-228-150.66.2.i586",
"product": {
"name": "udev-mini-228-150.66.2.i586",
"product_id": "udev-mini-228-150.66.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-bash-completion-228-150.66.4.noarch",
"product": {
"name": "systemd-bash-completion-228-150.66.4.noarch",
"product_id": "systemd-bash-completion-228-150.66.4.noarch"
}
},
{
"category": "product_version",
"name": "systemd-mini-bash-completion-228-150.66.2.noarch",
"product": {
"name": "systemd-mini-bash-completion-228-150.66.2.noarch",
"product_id": "systemd-mini-bash-completion-228-150.66.2.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-228-150.66.4.ppc64le",
"product": {
"name": "libsystemd0-228-150.66.4.ppc64le",
"product_id": "libsystemd0-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-228-150.66.2.ppc64le",
"product": {
"name": "libsystemd0-mini-228-150.66.2.ppc64le",
"product_id": "libsystemd0-mini-228-150.66.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-devel-228-150.66.4.ppc64le",
"product": {
"name": "libudev-devel-228-150.66.4.ppc64le",
"product_id": "libudev-devel-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-228-150.66.2.ppc64le",
"product": {
"name": "libudev-mini-devel-228-150.66.2.ppc64le",
"product_id": "libudev-mini-devel-228-150.66.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-mini1-228-150.66.2.ppc64le",
"product": {
"name": "libudev-mini1-228-150.66.2.ppc64le",
"product_id": "libudev-mini1-228-150.66.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.66.4.ppc64le",
"product": {
"name": "libudev1-228-150.66.4.ppc64le",
"product_id": "libudev1-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-myhostname-228-150.66.4.ppc64le",
"product": {
"name": "nss-myhostname-228-150.66.4.ppc64le",
"product_id": "nss-myhostname-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-mymachines-228-150.66.4.ppc64le",
"product": {
"name": "nss-mymachines-228-150.66.4.ppc64le",
"product_id": "nss-mymachines-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-228-150.66.4.ppc64le",
"product": {
"name": "systemd-228-150.66.4.ppc64le",
"product_id": "systemd-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.66.4.ppc64le",
"product": {
"name": "systemd-devel-228-150.66.4.ppc64le",
"product_id": "systemd-devel-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-logger-228-150.66.4.ppc64le",
"product": {
"name": "systemd-logger-228-150.66.4.ppc64le",
"product_id": "systemd-logger-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-228-150.66.2.ppc64le",
"product": {
"name": "systemd-mini-228-150.66.2.ppc64le",
"product_id": "systemd-mini-228-150.66.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-228-150.66.2.ppc64le",
"product": {
"name": "systemd-mini-devel-228-150.66.2.ppc64le",
"product_id": "systemd-mini-devel-228-150.66.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-228-150.66.2.ppc64le",
"product": {
"name": "systemd-mini-sysvinit-228-150.66.2.ppc64le",
"product_id": "systemd-mini-sysvinit-228-150.66.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.66.4.ppc64le",
"product": {
"name": "systemd-sysvinit-228-150.66.4.ppc64le",
"product_id": "systemd-sysvinit-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-228-150.66.4.ppc64le",
"product": {
"name": "udev-228-150.66.4.ppc64le",
"product_id": "udev-228-150.66.4.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-mini-228-150.66.2.ppc64le",
"product": {
"name": "udev-mini-228-150.66.2.ppc64le",
"product_id": "udev-mini-228-150.66.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-228-150.66.4.s390",
"product": {
"name": "libsystemd0-228-150.66.4.s390",
"product_id": "libsystemd0-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-228-150.66.2.s390",
"product": {
"name": "libsystemd0-mini-228-150.66.2.s390",
"product_id": "libsystemd0-mini-228-150.66.2.s390"
}
},
{
"category": "product_version",
"name": "libudev-devel-228-150.66.4.s390",
"product": {
"name": "libudev-devel-228-150.66.4.s390",
"product_id": "libudev-devel-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-228-150.66.2.s390",
"product": {
"name": "libudev-mini-devel-228-150.66.2.s390",
"product_id": "libudev-mini-devel-228-150.66.2.s390"
}
},
{
"category": "product_version",
"name": "libudev-mini1-228-150.66.2.s390",
"product": {
"name": "libudev-mini1-228-150.66.2.s390",
"product_id": "libudev-mini1-228-150.66.2.s390"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.66.4.s390",
"product": {
"name": "libudev1-228-150.66.4.s390",
"product_id": "libudev1-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "nss-myhostname-228-150.66.4.s390",
"product": {
"name": "nss-myhostname-228-150.66.4.s390",
"product_id": "nss-myhostname-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "nss-mymachines-228-150.66.4.s390",
"product": {
"name": "nss-mymachines-228-150.66.4.s390",
"product_id": "nss-mymachines-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "systemd-228-150.66.4.s390",
"product": {
"name": "systemd-228-150.66.4.s390",
"product_id": "systemd-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.66.4.s390",
"product": {
"name": "systemd-devel-228-150.66.4.s390",
"product_id": "systemd-devel-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "systemd-logger-228-150.66.4.s390",
"product": {
"name": "systemd-logger-228-150.66.4.s390",
"product_id": "systemd-logger-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "systemd-mini-228-150.66.2.s390",
"product": {
"name": "systemd-mini-228-150.66.2.s390",
"product_id": "systemd-mini-228-150.66.2.s390"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-228-150.66.2.s390",
"product": {
"name": "systemd-mini-devel-228-150.66.2.s390",
"product_id": "systemd-mini-devel-228-150.66.2.s390"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-228-150.66.2.s390",
"product": {
"name": "systemd-mini-sysvinit-228-150.66.2.s390",
"product_id": "systemd-mini-sysvinit-228-150.66.2.s390"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.66.4.s390",
"product": {
"name": "systemd-sysvinit-228-150.66.4.s390",
"product_id": "systemd-sysvinit-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "udev-228-150.66.4.s390",
"product": {
"name": "udev-228-150.66.4.s390",
"product_id": "udev-228-150.66.4.s390"
}
},
{
"category": "product_version",
"name": "udev-mini-228-150.66.2.s390",
"product": {
"name": "udev-mini-228-150.66.2.s390",
"product_id": "udev-mini-228-150.66.2.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-228-150.66.4.s390x",
"product": {
"name": "libsystemd0-228-150.66.4.s390x",
"product_id": "libsystemd0-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-228-150.66.4.s390x",
"product": {
"name": "libsystemd0-32bit-228-150.66.4.s390x",
"product_id": "libsystemd0-32bit-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-228-150.66.2.s390x",
"product": {
"name": "libsystemd0-mini-228-150.66.2.s390x",
"product_id": "libsystemd0-mini-228-150.66.2.s390x"
}
},
{
"category": "product_version",
"name": "libudev-devel-228-150.66.4.s390x",
"product": {
"name": "libudev-devel-228-150.66.4.s390x",
"product_id": "libudev-devel-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-228-150.66.2.s390x",
"product": {
"name": "libudev-mini-devel-228-150.66.2.s390x",
"product_id": "libudev-mini-devel-228-150.66.2.s390x"
}
},
{
"category": "product_version",
"name": "libudev-mini1-228-150.66.2.s390x",
"product": {
"name": "libudev-mini1-228-150.66.2.s390x",
"product_id": "libudev-mini1-228-150.66.2.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.66.4.s390x",
"product": {
"name": "libudev1-228-150.66.4.s390x",
"product_id": "libudev1-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-228-150.66.4.s390x",
"product": {
"name": "libudev1-32bit-228-150.66.4.s390x",
"product_id": "libudev1-32bit-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "nss-myhostname-228-150.66.4.s390x",
"product": {
"name": "nss-myhostname-228-150.66.4.s390x",
"product_id": "nss-myhostname-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "nss-myhostname-32bit-228-150.66.4.s390x",
"product": {
"name": "nss-myhostname-32bit-228-150.66.4.s390x",
"product_id": "nss-myhostname-32bit-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "nss-mymachines-228-150.66.4.s390x",
"product": {
"name": "nss-mymachines-228-150.66.4.s390x",
"product_id": "nss-mymachines-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "systemd-228-150.66.4.s390x",
"product": {
"name": "systemd-228-150.66.4.s390x",
"product_id": "systemd-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "systemd-32bit-228-150.66.4.s390x",
"product": {
"name": "systemd-32bit-228-150.66.4.s390x",
"product_id": "systemd-32bit-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.66.4.s390x",
"product": {
"name": "systemd-devel-228-150.66.4.s390x",
"product_id": "systemd-devel-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "systemd-logger-228-150.66.4.s390x",
"product": {
"name": "systemd-logger-228-150.66.4.s390x",
"product_id": "systemd-logger-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-228-150.66.2.s390x",
"product": {
"name": "systemd-mini-228-150.66.2.s390x",
"product_id": "systemd-mini-228-150.66.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-228-150.66.2.s390x",
"product": {
"name": "systemd-mini-devel-228-150.66.2.s390x",
"product_id": "systemd-mini-devel-228-150.66.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-228-150.66.2.s390x",
"product": {
"name": "systemd-mini-sysvinit-228-150.66.2.s390x",
"product_id": "systemd-mini-sysvinit-228-150.66.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.66.4.s390x",
"product": {
"name": "systemd-sysvinit-228-150.66.4.s390x",
"product_id": "systemd-sysvinit-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "udev-228-150.66.4.s390x",
"product": {
"name": "udev-228-150.66.4.s390x",
"product_id": "udev-228-150.66.4.s390x"
}
},
{
"category": "product_version",
"name": "udev-mini-228-150.66.2.s390x",
"product": {
"name": "udev-mini-228-150.66.2.s390x",
"product_id": "udev-mini-228-150.66.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-228-150.66.4.x86_64",
"product": {
"name": "libsystemd0-228-150.66.4.x86_64",
"product_id": "libsystemd0-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-228-150.66.4.x86_64",
"product": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64",
"product_id": "libsystemd0-32bit-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-228-150.66.2.x86_64",
"product": {
"name": "libsystemd0-mini-228-150.66.2.x86_64",
"product_id": "libsystemd0-mini-228-150.66.2.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-devel-228-150.66.4.x86_64",
"product": {
"name": "libudev-devel-228-150.66.4.x86_64",
"product_id": "libudev-devel-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-228-150.66.2.x86_64",
"product": {
"name": "libudev-mini-devel-228-150.66.2.x86_64",
"product_id": "libudev-mini-devel-228-150.66.2.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-mini1-228-150.66.2.x86_64",
"product": {
"name": "libudev-mini1-228-150.66.2.x86_64",
"product_id": "libudev-mini1-228-150.66.2.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-228-150.66.4.x86_64",
"product": {
"name": "libudev1-228-150.66.4.x86_64",
"product_id": "libudev1-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-228-150.66.4.x86_64",
"product": {
"name": "libudev1-32bit-228-150.66.4.x86_64",
"product_id": "libudev1-32bit-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-228-150.66.4.x86_64",
"product": {
"name": "nss-myhostname-228-150.66.4.x86_64",
"product_id": "nss-myhostname-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-32bit-228-150.66.4.x86_64",
"product": {
"name": "nss-myhostname-32bit-228-150.66.4.x86_64",
"product_id": "nss-myhostname-32bit-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-228-150.66.4.x86_64",
"product": {
"name": "nss-mymachines-228-150.66.4.x86_64",
"product_id": "nss-mymachines-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-228-150.66.4.x86_64",
"product": {
"name": "systemd-228-150.66.4.x86_64",
"product_id": "systemd-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-32bit-228-150.66.4.x86_64",
"product": {
"name": "systemd-32bit-228-150.66.4.x86_64",
"product_id": "systemd-32bit-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-devel-228-150.66.4.x86_64",
"product": {
"name": "systemd-devel-228-150.66.4.x86_64",
"product_id": "systemd-devel-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-logger-228-150.66.4.x86_64",
"product": {
"name": "systemd-logger-228-150.66.4.x86_64",
"product_id": "systemd-logger-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-228-150.66.2.x86_64",
"product": {
"name": "systemd-mini-228-150.66.2.x86_64",
"product_id": "systemd-mini-228-150.66.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-228-150.66.2.x86_64",
"product": {
"name": "systemd-mini-devel-228-150.66.2.x86_64",
"product_id": "systemd-mini-devel-228-150.66.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-228-150.66.2.x86_64",
"product": {
"name": "systemd-mini-sysvinit-228-150.66.2.x86_64",
"product_id": "systemd-mini-sysvinit-228-150.66.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-228-150.66.4.x86_64",
"product": {
"name": "systemd-sysvinit-228-150.66.4.x86_64",
"product_id": "systemd-sysvinit-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "udev-228-150.66.4.x86_64",
"product": {
"name": "udev-228-150.66.4.x86_64",
"product_id": "udev-228-150.66.4.x86_64"
}
},
{
"category": "product_version",
"name": "udev-mini-228-150.66.2.x86_64",
"product": {
"name": "udev-mini-228-150.66.2.x86_64",
"product_id": "udev-mini-228-150.66.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE OpenStack Cloud 7",
"product": {
"name": "SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-openstack-cloud:7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sled:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-bcl:12:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 4",
"product": {
"name": "SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x"
},
"product_reference": "libudev-devel-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64"
},
"product_reference": "libudev-devel-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x"
},
"product_reference": "libudev1-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x"
},
"product_reference": "libudev1-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x"
},
"product_reference": "systemd-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x"
},
"product_reference": "systemd-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x"
},
"product_reference": "systemd-sysvinit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.s390x as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x"
},
"product_reference": "udev-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE OpenStack Cloud 7",
"product_id": "SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE OpenStack Cloud 7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
"product_id": "SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP4",
"product_id": "SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le"
},
"product_reference": "libsystemd0-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le"
},
"product_reference": "libudev-devel-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64"
},
"product_reference": "libudev-devel-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le"
},
"product_reference": "libudev1-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le"
},
"product_reference": "systemd-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le"
},
"product_reference": "systemd-sysvinit-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le"
},
"product_reference": "udev-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP2",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64"
},
"product_reference": "libudev-devel-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le"
},
"product_reference": "libudev-devel-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x"
},
"product_reference": "libudev-devel-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64"
},
"product_reference": "libudev-devel-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64"
},
"product_reference": "systemd-devel-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le"
},
"product_reference": "systemd-devel-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x"
},
"product_reference": "systemd-devel-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64"
},
"product_reference": "systemd-devel-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64"
},
"product_reference": "libudev-devel-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le"
},
"product_reference": "libudev-devel-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x"
},
"product_reference": "libudev-devel-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64"
},
"product_reference": "libudev-devel-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64"
},
"product_reference": "systemd-devel-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le"
},
"product_reference": "systemd-devel-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x"
},
"product_reference": "systemd-devel-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP4",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64"
},
"product_reference": "systemd-devel-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le"
},
"product_reference": "libsystemd0-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le"
},
"product_reference": "libudev-devel-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x"
},
"product_reference": "libudev-devel-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64"
},
"product_reference": "libudev-devel-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le"
},
"product_reference": "libudev1-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x"
},
"product_reference": "libudev1-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x"
},
"product_reference": "libudev1-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le"
},
"product_reference": "systemd-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x"
},
"product_reference": "systemd-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x"
},
"product_reference": "systemd-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le"
},
"product_reference": "systemd-sysvinit-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x"
},
"product_reference": "systemd-sysvinit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le"
},
"product_reference": "udev-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x"
},
"product_reference": "udev-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP2-BCL",
"product_id": "SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP2-BCL"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64"
},
"product_reference": "libsystemd0-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le"
},
"product_reference": "libsystemd0-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64"
},
"product_reference": "libudev1-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le"
},
"product_reference": "libudev1-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x"
},
"product_reference": "libudev1-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x"
},
"product_reference": "libudev1-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64"
},
"product_reference": "systemd-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le"
},
"product_reference": "systemd-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x"
},
"product_reference": "systemd-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x"
},
"product_reference": "systemd-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le"
},
"product_reference": "systemd-sysvinit-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x"
},
"product_reference": "systemd-sysvinit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64"
},
"product_reference": "udev-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le"
},
"product_reference": "udev-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x"
},
"product_reference": "udev-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
"product_id": "SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64"
},
"product_reference": "libsystemd0-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le"
},
"product_reference": "libsystemd0-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64"
},
"product_reference": "libudev1-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le"
},
"product_reference": "libudev1-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x"
},
"product_reference": "libudev1-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x"
},
"product_reference": "libudev1-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64"
},
"product_reference": "systemd-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le"
},
"product_reference": "systemd-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x"
},
"product_reference": "systemd-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x"
},
"product_reference": "systemd-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le"
},
"product_reference": "systemd-sysvinit-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x"
},
"product_reference": "systemd-sysvinit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64"
},
"product_reference": "udev-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le"
},
"product_reference": "udev-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x"
},
"product_reference": "udev-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64"
},
"product_reference": "libsystemd0-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le"
},
"product_reference": "libsystemd0-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64"
},
"product_reference": "libudev1-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le"
},
"product_reference": "libudev1-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x"
},
"product_reference": "libudev1-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x"
},
"product_reference": "libudev1-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64"
},
"product_reference": "systemd-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le"
},
"product_reference": "systemd-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x"
},
"product_reference": "systemd-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x"
},
"product_reference": "systemd-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le"
},
"product_reference": "systemd-sysvinit-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x"
},
"product_reference": "systemd-sysvinit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64"
},
"product_reference": "udev-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le"
},
"product_reference": "udev-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x"
},
"product_reference": "udev-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server 12 SP4",
"product_id": "SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64"
},
"product_reference": "libsystemd0-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le"
},
"product_reference": "libsystemd0-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64"
},
"product_reference": "libudev1-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le"
},
"product_reference": "libudev1-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x"
},
"product_reference": "libudev1-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x"
},
"product_reference": "libudev1-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64"
},
"product_reference": "systemd-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le"
},
"product_reference": "systemd-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x"
},
"product_reference": "systemd-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x"
},
"product_reference": "systemd-32bit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le"
},
"product_reference": "systemd-sysvinit-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x"
},
"product_reference": "systemd-sysvinit-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64"
},
"product_reference": "udev-228-150.66.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le"
},
"product_reference": "udev-228-150.66.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x"
},
"product_reference": "udev-228-150.66.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64"
},
"product_reference": "libsystemd0-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64"
},
"product_reference": "libudev-devel-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64"
},
"product_reference": "libudev1-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64"
},
"product_reference": "libudev1-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64"
},
"product_reference": "systemd-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64"
},
"product_reference": "systemd-32bit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-228-150.66.4.noarch as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch"
},
"product_reference": "systemd-bash-completion-228-150.66.4.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64"
},
"product_reference": "systemd-sysvinit-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-228-150.66.4.x86_64 as component of SUSE Enterprise Storage 4",
"product_id": "SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64"
},
"product_reference": "udev-228-150.66.4.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-6954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6954"
}
],
"notes": [
{
"category": "general",
"text": "systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6954",
"url": "https://www.suse.com/security/cve/CVE-2018-6954"
},
{
"category": "external",
"summary": "SUSE Bug 1080919 for CVE-2018-6954",
"url": "https://bugzilla.suse.com/1080919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-16T07:53:09Z",
"details": "important"
}
],
"title": "CVE-2018-6954"
},
{
"cve": "CVE-2019-3842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3842"
}
],
"notes": [
{
"category": "general",
"text": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3842",
"url": "https://www.suse.com/security/cve/CVE-2019-3842"
},
{
"category": "external",
"summary": "SUSE Bug 1132348 for CVE-2019-3842",
"url": "https://bugzilla.suse.com/1132348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-16T07:53:09Z",
"details": "moderate"
}
],
"title": "CVE-2019-3842"
},
{
"cve": "CVE-2019-6454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6454"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6454",
"url": "https://www.suse.com/security/cve/CVE-2019-6454"
},
{
"category": "external",
"summary": "SUSE Bug 1125352 for CVE-2019-6454",
"url": "https://bugzilla.suse.com/1125352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Enterprise Storage 4:libsystemd0-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev-devel-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Enterprise Storage 4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Enterprise Storage 4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Desktop 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Desktop 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-BCL:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-BCL:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP2-LTSS:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP2:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP3:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:libudev1-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-32bit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-bash-completion-228-150.66.4.noarch",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP4:udev-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP3:systemd-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:libudev-devel-228-150.66.4.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP4:systemd-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libsystemd0-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev-devel-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:libudev1-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-32bit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:systemd-bash-completion-228-150.66.4.noarch",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:systemd-sysvinit-228-150.66.4.x86_64",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.s390x",
"SUSE OpenStack Cloud 7:udev-228-150.66.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-16T07:53:09Z",
"details": "important"
}
],
"title": "CVE-2019-6454"
}
]
}
SUSE-SU-2019:1364-1
Vulnerability from csaf_suse - Published: 2019-05-28 08:51 - Updated: 2019-05-28 08:51| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for systemd",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for systemd fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-3842: Fixed a privilege escalation in pam_systemd which could be exploited by a local user (bsc#1132348).\n- CVE-2019-6454: Fixed a denial of service via crafted D-Bus message (bsc#1125352).\n- CVE-2019-3843, CVE-2019-3844: Fixed a privilege escalation where services with DynamicUser could gain new privileges or create SUID/SGID binaries (bsc#1133506, bsc#1133509).\n\nNon-security issued fixed:\n\n- logind: fix killing of scopes (bsc#1125604)\n- namespace: make MountFlags=shared work again (bsc#1124122)\n- rules: load drivers only on \u0027add\u0027 events (bsc#1126056)\n- sysctl: Don\u0027t pass null directive argument to \u0027%s\u0027 (bsc#1121563)\n- systemd-coredump: generate a stack trace of all core dumps and log into the journal (jsc#SLE-5933)\n- udevd: notify when max number value of children is reached only once per batch of events (bsc#1132400)\n- sd-bus: bump message queue size again (bsc#1132721)\n- Do not automatically online memory on s390x (bsc#1127557)\n- Removed sg.conf (bsc#1036463)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2019-1364,SUSE-SLE-Module-Basesystem-15-2019-1364,SUSE-SLE-Module-Development-Tools-OBS-15-2019-1364",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_1364-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2019:1364-1",
"url": "https://www.suse.com/support/update/announcement/2019/suse-su-20191364-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2019:1364-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2019-May/005509.html"
},
{
"category": "self",
"summary": "SUSE Bug 1036463",
"url": "https://bugzilla.suse.com/1036463"
},
{
"category": "self",
"summary": "SUSE Bug 1121563",
"url": "https://bugzilla.suse.com/1121563"
},
{
"category": "self",
"summary": "SUSE Bug 1124122",
"url": "https://bugzilla.suse.com/1124122"
},
{
"category": "self",
"summary": "SUSE Bug 1125352",
"url": "https://bugzilla.suse.com/1125352"
},
{
"category": "self",
"summary": "SUSE Bug 1125604",
"url": "https://bugzilla.suse.com/1125604"
},
{
"category": "self",
"summary": "SUSE Bug 1126056",
"url": "https://bugzilla.suse.com/1126056"
},
{
"category": "self",
"summary": "SUSE Bug 1127557",
"url": "https://bugzilla.suse.com/1127557"
},
{
"category": "self",
"summary": "SUSE Bug 1130230",
"url": "https://bugzilla.suse.com/1130230"
},
{
"category": "self",
"summary": "SUSE Bug 1132348",
"url": "https://bugzilla.suse.com/1132348"
},
{
"category": "self",
"summary": "SUSE Bug 1132400",
"url": "https://bugzilla.suse.com/1132400"
},
{
"category": "self",
"summary": "SUSE Bug 1132721",
"url": "https://bugzilla.suse.com/1132721"
},
{
"category": "self",
"summary": "SUSE Bug 1133506",
"url": "https://bugzilla.suse.com/1133506"
},
{
"category": "self",
"summary": "SUSE Bug 1133509",
"url": "https://bugzilla.suse.com/1133509"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3842 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3843 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3844 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3844/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6454 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6454/"
},
{
"category": "self",
"summary": "SUSE Bug SLE-5933",
"url": "https://bugzilla.suse.com/SLE-5933"
}
],
"title": "Security update for systemd",
"tracking": {
"current_release_date": "2019-05-28T08:51:42Z",
"generator": {
"date": "2019-05-28T08:51:42Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2019:1364-1",
"initial_release_date": "2019-05-28T08:51:42Z",
"revision_history": [
{
"date": "2019-05-28T08:51:42Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.aarch64",
"product": {
"name": "libsystemd0-234-24.30.1.aarch64",
"product_id": "libsystemd0-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.aarch64",
"product": {
"name": "libsystemd0-mini-234-24.30.1.aarch64",
"product_id": "libsystemd0-mini-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.aarch64",
"product": {
"name": "libudev-devel-234-24.30.1.aarch64",
"product_id": "libudev-devel-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.aarch64",
"product": {
"name": "libudev-mini-devel-234-24.30.1.aarch64",
"product_id": "libudev-mini-devel-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.aarch64",
"product": {
"name": "libudev-mini1-234-24.30.1.aarch64",
"product_id": "libudev-mini1-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.aarch64",
"product": {
"name": "libudev1-234-24.30.1.aarch64",
"product_id": "libudev1-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.aarch64",
"product": {
"name": "nss-myhostname-234-24.30.1.aarch64",
"product_id": "nss-myhostname-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.aarch64",
"product": {
"name": "nss-mymachines-234-24.30.1.aarch64",
"product_id": "nss-mymachines-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.aarch64",
"product": {
"name": "nss-systemd-234-24.30.1.aarch64",
"product_id": "nss-systemd-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.aarch64",
"product": {
"name": "systemd-234-24.30.1.aarch64",
"product_id": "systemd-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.aarch64",
"product": {
"name": "systemd-container-234-24.30.1.aarch64",
"product_id": "systemd-container-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.aarch64",
"product": {
"name": "systemd-coredump-234-24.30.1.aarch64",
"product_id": "systemd-coredump-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.aarch64",
"product": {
"name": "systemd-devel-234-24.30.1.aarch64",
"product_id": "systemd-devel-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.aarch64",
"product": {
"name": "systemd-logger-234-24.30.1.aarch64",
"product_id": "systemd-logger-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-234-24.30.1.aarch64",
"product_id": "systemd-mini-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.aarch64",
"product_id": "systemd-mini-container-mini-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.aarch64",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-devel-234-24.30.1.aarch64",
"product_id": "systemd-mini-devel-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.aarch64",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.aarch64",
"product_id": "systemd-mini-sysvinit-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.aarch64",
"product": {
"name": "systemd-sysvinit-234-24.30.1.aarch64",
"product_id": "systemd-sysvinit-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.aarch64",
"product": {
"name": "udev-234-24.30.1.aarch64",
"product_id": "udev-234-24.30.1.aarch64"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.aarch64",
"product": {
"name": "udev-mini-234-24.30.1.aarch64",
"product_id": "udev-mini-234-24.30.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "libsystemd0-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "libsystemd0-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libudev-devel-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "libudev-devel-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "libudev-devel-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libudev1-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "libudev1-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "libudev1-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "nss-myhostname-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "nss-mymachines-64bit-234-24.30.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "systemd-64bit-234-24.30.1.aarch64_ilp32",
"product": {
"name": "systemd-64bit-234-24.30.1.aarch64_ilp32",
"product_id": "systemd-64bit-234-24.30.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.i586",
"product": {
"name": "libsystemd0-234-24.30.1.i586",
"product_id": "libsystemd0-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.i586",
"product": {
"name": "libsystemd0-mini-234-24.30.1.i586",
"product_id": "libsystemd0-mini-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.i586",
"product": {
"name": "libudev-devel-234-24.30.1.i586",
"product_id": "libudev-devel-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.i586",
"product": {
"name": "libudev-mini-devel-234-24.30.1.i586",
"product_id": "libudev-mini-devel-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.i586",
"product": {
"name": "libudev-mini1-234-24.30.1.i586",
"product_id": "libudev-mini1-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.i586",
"product": {
"name": "libudev1-234-24.30.1.i586",
"product_id": "libudev1-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.i586",
"product": {
"name": "nss-myhostname-234-24.30.1.i586",
"product_id": "nss-myhostname-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.i586",
"product": {
"name": "nss-mymachines-234-24.30.1.i586",
"product_id": "nss-mymachines-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.i586",
"product": {
"name": "nss-systemd-234-24.30.1.i586",
"product_id": "nss-systemd-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.i586",
"product": {
"name": "systemd-234-24.30.1.i586",
"product_id": "systemd-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.i586",
"product": {
"name": "systemd-container-234-24.30.1.i586",
"product_id": "systemd-container-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.i586",
"product": {
"name": "systemd-coredump-234-24.30.1.i586",
"product_id": "systemd-coredump-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.i586",
"product": {
"name": "systemd-devel-234-24.30.1.i586",
"product_id": "systemd-devel-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.i586",
"product": {
"name": "systemd-logger-234-24.30.1.i586",
"product_id": "systemd-logger-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.i586",
"product": {
"name": "systemd-mini-234-24.30.1.i586",
"product_id": "systemd-mini-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.i586",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.i586",
"product_id": "systemd-mini-container-mini-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.i586",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.i586",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.i586",
"product": {
"name": "systemd-mini-devel-234-24.30.1.i586",
"product_id": "systemd-mini-devel-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.i586",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.i586",
"product_id": "systemd-mini-sysvinit-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.i586",
"product": {
"name": "systemd-sysvinit-234-24.30.1.i586",
"product_id": "systemd-sysvinit-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.i586",
"product": {
"name": "udev-234-24.30.1.i586",
"product_id": "udev-234-24.30.1.i586"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.i586",
"product": {
"name": "udev-mini-234-24.30.1.i586",
"product_id": "udev-mini-234-24.30.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-bash-completion-234-24.30.1.noarch",
"product": {
"name": "systemd-bash-completion-234-24.30.1.noarch",
"product_id": "systemd-bash-completion-234-24.30.1.noarch"
}
},
{
"category": "product_version",
"name": "systemd-mini-bash-completion-234-24.30.1.noarch",
"product": {
"name": "systemd-mini-bash-completion-234-24.30.1.noarch",
"product_id": "systemd-mini-bash-completion-234-24.30.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.ppc64le",
"product": {
"name": "libsystemd0-234-24.30.1.ppc64le",
"product_id": "libsystemd0-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.ppc64le",
"product": {
"name": "libsystemd0-mini-234-24.30.1.ppc64le",
"product_id": "libsystemd0-mini-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.ppc64le",
"product": {
"name": "libudev-devel-234-24.30.1.ppc64le",
"product_id": "libudev-devel-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.ppc64le",
"product": {
"name": "libudev-mini-devel-234-24.30.1.ppc64le",
"product_id": "libudev-mini-devel-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.ppc64le",
"product": {
"name": "libudev-mini1-234-24.30.1.ppc64le",
"product_id": "libudev-mini1-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.ppc64le",
"product": {
"name": "libudev1-234-24.30.1.ppc64le",
"product_id": "libudev1-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.ppc64le",
"product": {
"name": "nss-myhostname-234-24.30.1.ppc64le",
"product_id": "nss-myhostname-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.ppc64le",
"product": {
"name": "nss-mymachines-234-24.30.1.ppc64le",
"product_id": "nss-mymachines-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.ppc64le",
"product": {
"name": "nss-systemd-234-24.30.1.ppc64le",
"product_id": "nss-systemd-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.ppc64le",
"product": {
"name": "systemd-234-24.30.1.ppc64le",
"product_id": "systemd-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.ppc64le",
"product": {
"name": "systemd-container-234-24.30.1.ppc64le",
"product_id": "systemd-container-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.ppc64le",
"product": {
"name": "systemd-coredump-234-24.30.1.ppc64le",
"product_id": "systemd-coredump-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.ppc64le",
"product": {
"name": "systemd-devel-234-24.30.1.ppc64le",
"product_id": "systemd-devel-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.ppc64le",
"product": {
"name": "systemd-logger-234-24.30.1.ppc64le",
"product_id": "systemd-logger-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-234-24.30.1.ppc64le",
"product_id": "systemd-mini-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.ppc64le",
"product_id": "systemd-mini-container-mini-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.ppc64le",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-devel-234-24.30.1.ppc64le",
"product_id": "systemd-mini-devel-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.ppc64le",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.ppc64le",
"product_id": "systemd-mini-sysvinit-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.ppc64le",
"product": {
"name": "systemd-sysvinit-234-24.30.1.ppc64le",
"product_id": "systemd-sysvinit-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.ppc64le",
"product": {
"name": "udev-234-24.30.1.ppc64le",
"product_id": "udev-234-24.30.1.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.ppc64le",
"product": {
"name": "udev-mini-234-24.30.1.ppc64le",
"product_id": "udev-mini-234-24.30.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.s390x",
"product": {
"name": "libsystemd0-234-24.30.1.s390x",
"product_id": "libsystemd0-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.s390x",
"product": {
"name": "libsystemd0-mini-234-24.30.1.s390x",
"product_id": "libsystemd0-mini-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.s390x",
"product": {
"name": "libudev-devel-234-24.30.1.s390x",
"product_id": "libudev-devel-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.s390x",
"product": {
"name": "libudev-mini-devel-234-24.30.1.s390x",
"product_id": "libudev-mini-devel-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.s390x",
"product": {
"name": "libudev-mini1-234-24.30.1.s390x",
"product_id": "libudev-mini1-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.s390x",
"product": {
"name": "libudev1-234-24.30.1.s390x",
"product_id": "libudev1-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.s390x",
"product": {
"name": "nss-myhostname-234-24.30.1.s390x",
"product_id": "nss-myhostname-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.s390x",
"product": {
"name": "nss-mymachines-234-24.30.1.s390x",
"product_id": "nss-mymachines-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.s390x",
"product": {
"name": "nss-systemd-234-24.30.1.s390x",
"product_id": "nss-systemd-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.s390x",
"product": {
"name": "systemd-234-24.30.1.s390x",
"product_id": "systemd-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.s390x",
"product": {
"name": "systemd-container-234-24.30.1.s390x",
"product_id": "systemd-container-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.s390x",
"product": {
"name": "systemd-coredump-234-24.30.1.s390x",
"product_id": "systemd-coredump-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.s390x",
"product": {
"name": "systemd-devel-234-24.30.1.s390x",
"product_id": "systemd-devel-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.s390x",
"product": {
"name": "systemd-logger-234-24.30.1.s390x",
"product_id": "systemd-logger-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-234-24.30.1.s390x",
"product_id": "systemd-mini-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.s390x",
"product_id": "systemd-mini-container-mini-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.s390x",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-devel-234-24.30.1.s390x",
"product_id": "systemd-mini-devel-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.s390x",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.s390x",
"product_id": "systemd-mini-sysvinit-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.s390x",
"product": {
"name": "systemd-sysvinit-234-24.30.1.s390x",
"product_id": "systemd-sysvinit-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.s390x",
"product": {
"name": "udev-234-24.30.1.s390x",
"product_id": "udev-234-24.30.1.s390x"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.s390x",
"product": {
"name": "udev-mini-234-24.30.1.s390x",
"product_id": "udev-mini-234-24.30.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-234-24.30.1.x86_64",
"product": {
"name": "libsystemd0-234-24.30.1.x86_64",
"product_id": "libsystemd0-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-234-24.30.1.x86_64",
"product": {
"name": "libsystemd0-32bit-234-24.30.1.x86_64",
"product_id": "libsystemd0-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libsystemd0-mini-234-24.30.1.x86_64",
"product": {
"name": "libsystemd0-mini-234-24.30.1.x86_64",
"product_id": "libsystemd0-mini-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-devel-234-24.30.1.x86_64",
"product": {
"name": "libudev-devel-234-24.30.1.x86_64",
"product_id": "libudev-devel-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-devel-32bit-234-24.30.1.x86_64",
"product": {
"name": "libudev-devel-32bit-234-24.30.1.x86_64",
"product_id": "libudev-devel-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-mini-devel-234-24.30.1.x86_64",
"product": {
"name": "libudev-mini-devel-234-24.30.1.x86_64",
"product_id": "libudev-mini-devel-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-mini1-234-24.30.1.x86_64",
"product": {
"name": "libudev-mini1-234-24.30.1.x86_64",
"product_id": "libudev-mini1-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-234-24.30.1.x86_64",
"product": {
"name": "libudev1-234-24.30.1.x86_64",
"product_id": "libudev1-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-234-24.30.1.x86_64",
"product": {
"name": "libudev1-32bit-234-24.30.1.x86_64",
"product_id": "libudev1-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-234-24.30.1.x86_64",
"product": {
"name": "nss-myhostname-234-24.30.1.x86_64",
"product_id": "nss-myhostname-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-32bit-234-24.30.1.x86_64",
"product": {
"name": "nss-myhostname-32bit-234-24.30.1.x86_64",
"product_id": "nss-myhostname-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-234-24.30.1.x86_64",
"product": {
"name": "nss-mymachines-234-24.30.1.x86_64",
"product_id": "nss-mymachines-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-32bit-234-24.30.1.x86_64",
"product": {
"name": "nss-mymachines-32bit-234-24.30.1.x86_64",
"product_id": "nss-mymachines-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "nss-systemd-234-24.30.1.x86_64",
"product": {
"name": "nss-systemd-234-24.30.1.x86_64",
"product_id": "nss-systemd-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-234-24.30.1.x86_64",
"product": {
"name": "systemd-234-24.30.1.x86_64",
"product_id": "systemd-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-32bit-234-24.30.1.x86_64",
"product": {
"name": "systemd-32bit-234-24.30.1.x86_64",
"product_id": "systemd-32bit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-container-234-24.30.1.x86_64",
"product": {
"name": "systemd-container-234-24.30.1.x86_64",
"product_id": "systemd-container-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-coredump-234-24.30.1.x86_64",
"product": {
"name": "systemd-coredump-234-24.30.1.x86_64",
"product_id": "systemd-coredump-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-devel-234-24.30.1.x86_64",
"product": {
"name": "systemd-devel-234-24.30.1.x86_64",
"product_id": "systemd-devel-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-logger-234-24.30.1.x86_64",
"product": {
"name": "systemd-logger-234-24.30.1.x86_64",
"product_id": "systemd-logger-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-234-24.30.1.x86_64",
"product_id": "systemd-mini-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-container-mini-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-container-mini-234-24.30.1.x86_64",
"product_id": "systemd-mini-container-mini-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-coredump-mini-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-coredump-mini-234-24.30.1.x86_64",
"product_id": "systemd-mini-coredump-mini-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-devel-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-devel-234-24.30.1.x86_64",
"product_id": "systemd-mini-devel-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-mini-sysvinit-234-24.30.1.x86_64",
"product": {
"name": "systemd-mini-sysvinit-234-24.30.1.x86_64",
"product_id": "systemd-mini-sysvinit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-234-24.30.1.x86_64",
"product": {
"name": "systemd-sysvinit-234-24.30.1.x86_64",
"product_id": "systemd-sysvinit-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "udev-234-24.30.1.x86_64",
"product": {
"name": "udev-234-24.30.1.x86_64",
"product_id": "udev-234-24.30.1.x86_64"
}
},
{
"category": "product_version",
"name": "udev-mini-234-24.30.1.x86_64",
"product": {
"name": "udev-mini-234-24.30.1.x86_64",
"product_id": "udev-mini-234-24.30.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64"
},
"product_reference": "libsystemd0-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le"
},
"product_reference": "libsystemd0-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x"
},
"product_reference": "libsystemd0-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64"
},
"product_reference": "libsystemd0-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64"
},
"product_reference": "libsystemd0-32bit-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64"
},
"product_reference": "libudev-devel-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le"
},
"product_reference": "libudev-devel-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x"
},
"product_reference": "libudev-devel-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64"
},
"product_reference": "libudev-devel-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64"
},
"product_reference": "libudev1-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le"
},
"product_reference": "libudev1-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x"
},
"product_reference": "libudev1-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64"
},
"product_reference": "libudev1-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64"
},
"product_reference": "libudev1-32bit-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64"
},
"product_reference": "systemd-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le"
},
"product_reference": "systemd-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x"
},
"product_reference": "systemd-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64"
},
"product_reference": "systemd-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64"
},
"product_reference": "systemd-32bit-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-bash-completion-234-24.30.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch"
},
"product_reference": "systemd-bash-completion-234-24.30.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64"
},
"product_reference": "systemd-container-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le"
},
"product_reference": "systemd-container-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x"
},
"product_reference": "systemd-container-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64"
},
"product_reference": "systemd-container-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64"
},
"product_reference": "systemd-coredump-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le"
},
"product_reference": "systemd-coredump-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x"
},
"product_reference": "systemd-coredump-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64"
},
"product_reference": "systemd-coredump-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64"
},
"product_reference": "systemd-devel-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le"
},
"product_reference": "systemd-devel-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x"
},
"product_reference": "systemd-devel-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64"
},
"product_reference": "systemd-devel-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64"
},
"product_reference": "systemd-sysvinit-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le"
},
"product_reference": "systemd-sysvinit-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x"
},
"product_reference": "systemd-sysvinit-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64"
},
"product_reference": "systemd-sysvinit-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-234-24.30.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64"
},
"product_reference": "udev-234-24.30.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-234-24.30.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le"
},
"product_reference": "udev-234-24.30.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-234-24.30.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x"
},
"product_reference": "udev-234-24.30.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-234-24.30.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
},
"product_reference": "udev-234-24.30.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3842"
}
],
"notes": [
{
"category": "general",
"text": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3842",
"url": "https://www.suse.com/security/cve/CVE-2019-3842"
},
{
"category": "external",
"summary": "SUSE Bug 1132348 for CVE-2019-3842",
"url": "https://bugzilla.suse.com/1132348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-28T08:51:42Z",
"details": "moderate"
}
],
"title": "CVE-2019-3842"
},
{
"cve": "CVE-2019-3843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3843"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3843",
"url": "https://www.suse.com/security/cve/CVE-2019-3843"
},
{
"category": "external",
"summary": "SUSE Bug 1133506 for CVE-2019-3843",
"url": "https://bugzilla.suse.com/1133506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-28T08:51:42Z",
"details": "moderate"
}
],
"title": "CVE-2019-3843"
},
{
"cve": "CVE-2019-3844",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3844"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3844",
"url": "https://www.suse.com/security/cve/CVE-2019-3844"
},
{
"category": "external",
"summary": "SUSE Bug 1133509 for CVE-2019-3844",
"url": "https://bugzilla.suse.com/1133509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-28T08:51:42Z",
"details": "moderate"
}
],
"title": "CVE-2019-3844"
},
{
"cve": "CVE-2019-6454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6454"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6454",
"url": "https://www.suse.com/security/cve/CVE-2019-6454"
},
{
"category": "external",
"summary": "SUSE Bug 1125352 for CVE-2019-6454",
"url": "https://bugzilla.suse.com/1125352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libsystemd0-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:libudev1-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-32bit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-bash-completion-234-24.30.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-container-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-coredump-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-devel-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:systemd-sysvinit-234-24.30.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15:udev-234-24.30.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-05-28T08:51:42Z",
"details": "important"
}
],
"title": "CVE-2019-6454"
}
]
}
VAR-201904-0347
Vulnerability from variot - Updated: 2026-03-09 23:24In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any". Systemd is a Linux-based system and service manager for Lennart Poettering software developers in Germany. The product is compatible with SysV and LSB startup scripts and provides a framework for representing dependencies between system services. A license and access control vulnerability exists in the systemdv242-rc4 release that stems from the lack of effective permissions and access control measures for network systems or products. An attacker could exploit this vulnerability to gain access to webmasters. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: systemd security, bug fix, and enhancement update Advisory ID: RHSA-2021:1611-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2021:1611 Issue date: 2021-05-18 CVE Names: CVE-2019-3842 CVE-2020-13776 ==================================================================== 1. Summary:
An update for systemd is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64
- It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.
Security Fix(es):
-
systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any" (CVE-2019-3842)
-
systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Bugs fixed (https://bugzilla.redhat.com/):
1668521 - CVE-2019-3842 systemd: Spoofing of XDG_SEAT allows for actions to be checked against "allow_active" instead of "allow_any" 1740657 - [RFE] NUMA aware CPU affinity setting in systemd unit files 1755287 - localectl set-locale should issue an error message when trying to set a nonexistent locale 1764282 - systemd[XXXXX]: Failed to connect to API bus: Connection refused 1812972 - backport request: allow instantiated units to be enabled via presets 1819868 - systemd excessively reads mountinfo and udev is dense OpenShift environments 1845534 - CVE-2020-13776 systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits 1862714 - LIBSYSTEMD_VERSION value format change crashes systemd-python pip install 1865840 - systemd-tmpfiles request for backport 1868831 - FreezerState is incorrectly updated on system running cgroup v1 1868877 - Enabling the smack feature on the host may cause the container to fail to start 1870638 - RFE: Add an option to Socket units to clear the data before listening again 1871139 - [systemd] systemd-resolved.service:33: Unknown lvalue 'ProtectSystems' in section 'Service' 1880270 - "Failed to start user service, ignoring" when masking user@.service 1885553 - "systemd --user" can dump core upon session closing 1887181 - Backport PassPacketInfo= support into systemd of RHEL 8 1888912 - SELinux policy change not visible to systemd until daemon-reexec 1889996 - backport vconsole-setup: downgrade log message when setting font fails on dummy console
- Package List:
Red Hat Enterprise Linux BaseOS (v. 8):
Source: systemd-239-45.el8.src.rpm
aarch64: systemd-239-45.el8.aarch64.rpm systemd-container-239-45.el8.aarch64.rpm systemd-container-debuginfo-239-45.el8.aarch64.rpm systemd-debuginfo-239-45.el8.aarch64.rpm systemd-debugsource-239-45.el8.aarch64.rpm systemd-devel-239-45.el8.aarch64.rpm systemd-journal-remote-239-45.el8.aarch64.rpm systemd-journal-remote-debuginfo-239-45.el8.aarch64.rpm systemd-libs-239-45.el8.aarch64.rpm systemd-libs-debuginfo-239-45.el8.aarch64.rpm systemd-pam-239-45.el8.aarch64.rpm systemd-pam-debuginfo-239-45.el8.aarch64.rpm systemd-tests-239-45.el8.aarch64.rpm systemd-tests-debuginfo-239-45.el8.aarch64.rpm systemd-udev-239-45.el8.aarch64.rpm systemd-udev-debuginfo-239-45.el8.aarch64.rpm
ppc64le: systemd-239-45.el8.ppc64le.rpm systemd-container-239-45.el8.ppc64le.rpm systemd-container-debuginfo-239-45.el8.ppc64le.rpm systemd-debuginfo-239-45.el8.ppc64le.rpm systemd-debugsource-239-45.el8.ppc64le.rpm systemd-devel-239-45.el8.ppc64le.rpm systemd-journal-remote-239-45.el8.ppc64le.rpm systemd-journal-remote-debuginfo-239-45.el8.ppc64le.rpm systemd-libs-239-45.el8.ppc64le.rpm systemd-libs-debuginfo-239-45.el8.ppc64le.rpm systemd-pam-239-45.el8.ppc64le.rpm systemd-pam-debuginfo-239-45.el8.ppc64le.rpm systemd-tests-239-45.el8.ppc64le.rpm systemd-tests-debuginfo-239-45.el8.ppc64le.rpm systemd-udev-239-45.el8.ppc64le.rpm systemd-udev-debuginfo-239-45.el8.ppc64le.rpm
s390x: systemd-239-45.el8.s390x.rpm systemd-container-239-45.el8.s390x.rpm systemd-container-debuginfo-239-45.el8.s390x.rpm systemd-debuginfo-239-45.el8.s390x.rpm systemd-debugsource-239-45.el8.s390x.rpm systemd-devel-239-45.el8.s390x.rpm systemd-journal-remote-239-45.el8.s390x.rpm systemd-journal-remote-debuginfo-239-45.el8.s390x.rpm systemd-libs-239-45.el8.s390x.rpm systemd-libs-debuginfo-239-45.el8.s390x.rpm systemd-pam-239-45.el8.s390x.rpm systemd-pam-debuginfo-239-45.el8.s390x.rpm systemd-tests-239-45.el8.s390x.rpm systemd-tests-debuginfo-239-45.el8.s390x.rpm systemd-udev-239-45.el8.s390x.rpm systemd-udev-debuginfo-239-45.el8.s390x.rpm
x86_64: systemd-239-45.el8.i686.rpm systemd-239-45.el8.x86_64.rpm systemd-container-239-45.el8.i686.rpm systemd-container-239-45.el8.x86_64.rpm systemd-container-debuginfo-239-45.el8.i686.rpm systemd-container-debuginfo-239-45.el8.x86_64.rpm systemd-debuginfo-239-45.el8.i686.rpm systemd-debuginfo-239-45.el8.x86_64.rpm systemd-debugsource-239-45.el8.i686.rpm systemd-debugsource-239-45.el8.x86_64.rpm systemd-devel-239-45.el8.i686.rpm systemd-devel-239-45.el8.x86_64.rpm systemd-journal-remote-239-45.el8.x86_64.rpm systemd-journal-remote-debuginfo-239-45.el8.i686.rpm systemd-journal-remote-debuginfo-239-45.el8.x86_64.rpm systemd-libs-239-45.el8.i686.rpm systemd-libs-239-45.el8.x86_64.rpm systemd-libs-debuginfo-239-45.el8.i686.rpm systemd-libs-debuginfo-239-45.el8.x86_64.rpm systemd-pam-239-45.el8.x86_64.rpm systemd-pam-debuginfo-239-45.el8.i686.rpm systemd-pam-debuginfo-239-45.el8.x86_64.rpm systemd-tests-239-45.el8.x86_64.rpm systemd-tests-debuginfo-239-45.el8.i686.rpm systemd-tests-debuginfo-239-45.el8.x86_64.rpm systemd-udev-239-45.el8.x86_64.rpm systemd-udev-debuginfo-239-45.el8.i686.rpm systemd-udev-debuginfo-239-45.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2019-3842 https://access.redhat.com/security/cve/CVE-2020-13776 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBYKPtN9zjgjWX9erEAQh1fw/9G0b1Nor53kXGEjIF5mkaTXpmJWYf1e+f 7fs7L0GIw5ecxzTx0dltY8yR2tLsGoGcCxHFQlTIBULu57RsHbR+cHsTG4iAMCW5 tFC1/CCNftao0Gr8LQu3a/XoIDQX3mKEvjly1Ry0g2nw/C126e0YYJwqPGRn7eIJ K98tUTD+wYd+UT+DKNBXmbc51+nZ4L+Bt2goBtc0NPxBI8IkpNExUmZV6e9UAxl6 dznK/EIjmCQucrfpEeg1c0DnxZIGU3zIfIM8C+s9vyeyKSfY0tdY++FcOQBMz5ms 8MG3CykDZWxnBJ4w9ta052BV7yYeJFHxpkMKR1q9JkAJj1zhnoDhm3v0l6qkrhrG oJfwkgZEbZkCXeixa2R7VO7aHhmdcpurv3RaBebRX5OvPdjppjkeKtxW/mp8BeSB XQPhIUpxPR2KZnjwY9P9AnUFq549BsPs9wHSSxagQaY+GRu7nLs2R0I4QD/KGsvB CG/Nm0xBCq9brFYTPFyTa9bPpqCMwWDqJlAFuO9+5fhvIiVQLHaovzMlOJOyKBUm /JMZ2s3azB6pLD/fiG+tmc4dNJ/bhC37n9++9zWG3USy3f33f/m7ELVGG2eVZ2mh W+vmCuFPoHokguaVkorCXEc5tT6tEKpsYqvPfa80GAEBadEQAjqFyg4AtBL5z4jx gSR+956dHOo=K4AI -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Bugs fixed (https://bugzilla.redhat.com/):
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation
Bug Fix(es):
-
WMCO patch pub-key-hash annotation to Linux node (BZ#1945248)
-
LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath (BZ#1952917)
-
Telemetry info not completely available to identify windows nodes (BZ#1955319)
-
WMCO incorrectly shows node as ready after a failed configuration (BZ#1956412)
-
kube-proxy service terminated unexpectedly after recreated LB service (BZ#1963263)
-
Solution:
For Windows Machine Config Operator upgrades, see the following documentation:
https://docs.openshift.com/container-platform/4.7/windows_containers/window s-node-upgrades.html
- Bugs fixed (https://bugzilla.redhat.com/):
1945248 - WMCO patch pub-key-hash annotation to Linux node 1946538 - CVE-2021-25736 kubernetes: LoadBalancer Service type don't create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM 1952917 - LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath 1955319 - Telemetry info not completely available to identify windows nodes 1956412 - WMCO incorrectly shows node as ready after a failed configuration 1963263 - kube-proxy service terminated unexpectedly after recreated LB service
- Bugs fixed (https://bugzilla.redhat.com/):
1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers 1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve 1928172 - CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads 1928937 - CVE-2021-23337 nodejs-lodash: command injection via template 1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions
- Description:
Red Hat Advanced Cluster Management for Kubernetes 2.2.4 images
Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana gement_for_kubernetes/2.2/html/release_notes/
Security fixes:
-
redisgraph-tls: redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms (CVE-2021-21309)
-
console-header-container: nodejs-netmask: improper input validation of octal input data (CVE-2021-28092)
-
console-container: nodejs-is-svg: ReDoS via malicious string (CVE-2021-28918)
Bug fixes:
-
RHACM 2.2.4 images (BZ# 1957254)
-
Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7 (BZ#1950832)
-
ACM Operator should support using the default route TLS (BZ# 1955270)
-
The scrolling bar for search filter does not work properly (BZ# 1956852)
-
Limits on Length of MultiClusterObservability Resource Name (BZ# 1959426)
-
The proxy setup in install-config.yaml is not worked when IPI installing with RHACM (BZ# 1960181)
-
Unable to make SSH connection to a Bitbucket server (BZ# 1966513)
-
Observability Thanos store shard crashing - cannot unmarshall DNS message (BZ# 1967890)
-
Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms 1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string 1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data 1950832 - Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7 1952150 - [DDF] It would be great to see all the options available for the bucket configuration and which attributes are mandatory 1954506 - [DDF] Table does not contain data about 20 clusters. Now it's difficult to estimate CPU usage with larger clusters 1954535 - Reinstall Submariner - No endpoints found on one cluster 1955270 - ACM Operator should support using the default route TLS 1956852 - The scrolling bar for search filter does not work properly 1957254 - RHACM 2.2.4 images 1959426 - Limits on Length of MultiClusterObservability Resource Name 1960181 - The proxy setup in install-config.yaml is not worked when IPI installing with RHACM. 1963128 - [DDF] Please rename this to "Amazon Elastic Kubernetes Service" 1966513 - Unable to make SSH connection to a Bitbucket server 1967357 - [DDF] When I clicked on this yaml, I get a HTTP 404 error. 1967890 - Observability Thanos store shard crashing - cannot unmarshal DNS message
- Bugs fixed (https://bugzilla.redhat.com/):
1937901 - CVE-2021-27918 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader 1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header 1965503 - CVE-2021-33196 golang: archive/zip: Malformed archive may cause panic or memory exhaustion 1971445 - Release of OpenShift Serverless Serving 1.16.0 1971448 - Release of OpenShift Serverless Eventing 1.16.0
- Description:
Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.
This advisory contains the container images for Red Hat OpenShift Container Platform 4.7.13. See the following advisory for the RPM packages for this release:
https://access.redhat.com/errata/RHSA-2021:2122
Space precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
This update fixes the following bug among others:
- Previously, resources for the ClusterOperator were being created early in the update process, which led to update failures when the ClusterOperator had no status condition while Operators were updating. This bug fix changes the timing of when these resources are created. As a result, updates can take place without errors. (BZ#1959238)
Security Fix(es):
- gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation (CVE-2021-3121)
You may download the oc tool and use it to inspect release image metadata as follows:
(For x86_64 architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-x86_64
The image digest is sha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4
(For s390x architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-s390x
The image digest is sha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd
(For ppc64le architecture)
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le
The image digest is sha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36
All OpenShift Container Platform 4.7 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift Console or the CLI oc command. Instructions for upgrading a cluster are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -between-minor.html#understanding-upgrade-channels_updating-cluster-between - -minor
- Solution:
For OpenShift Container Platform 4.7 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:
https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel ease-notes.html
Details on how to access this content are available at https://docs.openshift.com/container-platform/4.7/updating/updating-cluster - -cli.html
- Bugs fixed (https://bugzilla.redhat.com/):
1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation 1923268 - [Assisted-4.7] [Staging] Using two both spelling "canceled" "cancelled" 1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go 1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list 1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits 1959238 - CVO creating cloud-controller-manager too early causing upgrade failures 1960103 - SR-IOV obliviously reboot the node 1961941 - Local Storage Operator using LocalVolume CR fails to create PV's when backend storage failure is simulated 1962302 - packageserver clusteroperator does not set reason or message for Available condition 1962312 - Deployment considered unhealthy despite being available and at latest generation 1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone 1963115 - Test verify /run filesystem contents failing
- Summary:
Release of components for the Service Telemetry Framework
- Description:
Service Telemetry Framework (STF) provides automated collection of measurements and data from remote clients, such as Red Hat OpenStack Platform or third-party nodes.
Bug fixes:
-
STF 1.3.3 now supports OpenShift Container Platform 4.8 as an installation platform. (BZ#2013268)
-
With this update, the servicetelemetrys.infra.watch CRD has a validation that limits the clouds[].name to 10 characters and alphanumeric to avoid issues with extra characters in the cloud name and names being too long. (BZ#2011603)
-
Previously, when you installed STF without having Elastic Cloud on Kubernetes (ECK) Operator installed, the following error message was returned: "Failed to find exact match for elasticsearch.k8s.elastic.co/v1beta1.Elasticsearch". The error was as a result of Service Telemetry Operator trying to look up information from a non-existent API interface.
With this update, the Service Telemetry Operator verifies that the API exists before it attempts to make requests to the API interface that is provided by ECK. (BZ#1959166)
- Dockerfiles and scripts should be amended either to refer to this new image specifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/):
1959166 - Service Telemetry Operator can error out if ElasticSearch (ECK) CRD is not installed 1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic 2011603 - STF multi-cloud setup misinterprets name if a "-" is being used 2013268 - [RFE] Support STF 1.3 on OCP 4.8
5
Show details on source website{
"affected_products": {
"_id": null,
"data": [
{
"_id": null,
"model": "linux",
"scope": "eq",
"trust": 1.0,
"vendor": "debian",
"version": "8.0"
},
{
"_id": null,
"model": "fedora",
"scope": "eq",
"trust": 1.0,
"vendor": "fedoraproject",
"version": "30"
},
{
"_id": null,
"model": "systemd",
"scope": "eq",
"trust": 1.0,
"vendor": "systemd",
"version": "242"
},
{
"_id": null,
"model": "enterprise linux",
"scope": "eq",
"trust": 1.0,
"vendor": "redhat",
"version": "7.0"
},
{
"_id": null,
"model": "systemd",
"scope": "lte",
"trust": 1.0,
"vendor": "systemd",
"version": "241"
},
{
"_id": null,
"model": "v242-rc4",
"scope": null,
"trust": 0.6,
"vendor": "systemd",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14937"
},
{
"db": "NVD",
"id": "CVE-2019-3842"
}
]
},
"credits": {
"_id": null,
"data": "Red Hat",
"sources": [
{
"db": "PACKETSTORM",
"id": "162627"
},
{
"db": "PACKETSTORM",
"id": "162837"
},
{
"db": "PACKETSTORM",
"id": "163257"
},
{
"db": "PACKETSTORM",
"id": "163276"
},
{
"db": "PACKETSTORM",
"id": "163188"
},
{
"db": "PACKETSTORM",
"id": "163496"
},
{
"db": "PACKETSTORM",
"id": "162877"
},
{
"db": "PACKETSTORM",
"id": "164553"
},
{
"db": "PACKETSTORM",
"id": "164901"
}
],
"trust": 0.9
},
"cve": "CVE-2019-3842",
"cvss": {
"_id": null,
"data": [
{
"cvssV2": [
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "CVE-2019-3842",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.1,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.4,
"id": "CNVD-2019-14937",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.0,
"id": "CVE-2019-3842",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"author": "secalert@redhat.com",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"exploitabilityScore": 1.0,
"id": "CVE-2019-3842",
"impactScore": 3.4,
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-3842",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "secalert@redhat.com",
"id": "CVE-2019-3842",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "CNVD",
"id": "CNVD-2019-14937",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2019-3842",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14937"
},
{
"db": "VULMON",
"id": "CVE-2019-3842"
},
{
"db": "NVD",
"id": "CVE-2019-3842"
},
{
"db": "NVD",
"id": "CVE-2019-3842"
}
]
},
"description": {
"_id": null,
"data": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\". Systemd is a Linux-based system and service manager for Lennart Poettering software developers in Germany. The product is compatible with SysV and LSB startup scripts and provides a framework for representing dependencies between system services. A license and access control vulnerability exists in the systemdv242-rc4 release that stems from the lack of effective permissions and access control measures for network systems or products. An attacker could exploit this vulnerability to gain access to webmasters. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: systemd security, bug fix, and enhancement update\nAdvisory ID: RHSA-2021:1611-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2021:1611\nIssue date: 2021-05-18\nCVE Names: CVE-2019-3842 CVE-2020-13776\n====================================================================\n1. Summary:\n\nAn update for systemd is now available for Red Hat Enterprise Linux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. It provides\naggressive parallelism capabilities, uses socket and D-Bus activation for\nstarting services, offers on-demand starting of daemons, and keeps track of\nprocesses using Linux cgroups. In addition, it supports snapshotting and\nrestoring of the system state, maintains mount and automount points, and\nimplements an elaborate transactional dependency-based service control\nlogic. It can also work as a drop-in replacement for sysvinit. \n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against\n\"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or\n0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.4 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1668521 - CVE-2019-3842 systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"\n1740657 - [RFE] NUMA aware CPU affinity setting in systemd unit files\n1755287 - localectl set-locale should issue an error message when trying to set a nonexistent locale\n1764282 - systemd[XXXXX]: Failed to connect to API bus: Connection refused\n1812972 - backport request: allow instantiated units to be enabled via presets\n1819868 - systemd excessively reads mountinfo and udev is dense OpenShift environments\n1845534 - CVE-2020-13776 systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits\n1862714 - LIBSYSTEMD_VERSION value format change crashes systemd-python pip install\n1865840 - systemd-tmpfiles request for backport\n1868831 - FreezerState is incorrectly updated on system running cgroup v1\n1868877 - Enabling the smack feature on the host may cause the container to fail to start\n1870638 - RFE: Add an option to Socket units to clear the data before listening again\n1871139 - [systemd] systemd-resolved.service:33: Unknown lvalue \u0027ProtectSystems\u0027 in section \u0027Service\u0027\n1880270 - \"Failed to start user service, ignoring\" when masking user@.service\n1885553 - \"systemd --user\" can dump core upon session closing\n1887181 - Backport PassPacketInfo= support into systemd of RHEL 8\n1888912 - SELinux policy change not visible to systemd until daemon-reexec\n1889996 - backport vconsole-setup: downgrade log message when setting font fails on dummy console\n\n6. Package List:\n\nRed Hat Enterprise Linux BaseOS (v. 8):\n\nSource:\nsystemd-239-45.el8.src.rpm\n\naarch64:\nsystemd-239-45.el8.aarch64.rpm\nsystemd-container-239-45.el8.aarch64.rpm\nsystemd-container-debuginfo-239-45.el8.aarch64.rpm\nsystemd-debuginfo-239-45.el8.aarch64.rpm\nsystemd-debugsource-239-45.el8.aarch64.rpm\nsystemd-devel-239-45.el8.aarch64.rpm\nsystemd-journal-remote-239-45.el8.aarch64.rpm\nsystemd-journal-remote-debuginfo-239-45.el8.aarch64.rpm\nsystemd-libs-239-45.el8.aarch64.rpm\nsystemd-libs-debuginfo-239-45.el8.aarch64.rpm\nsystemd-pam-239-45.el8.aarch64.rpm\nsystemd-pam-debuginfo-239-45.el8.aarch64.rpm\nsystemd-tests-239-45.el8.aarch64.rpm\nsystemd-tests-debuginfo-239-45.el8.aarch64.rpm\nsystemd-udev-239-45.el8.aarch64.rpm\nsystemd-udev-debuginfo-239-45.el8.aarch64.rpm\n\nppc64le:\nsystemd-239-45.el8.ppc64le.rpm\nsystemd-container-239-45.el8.ppc64le.rpm\nsystemd-container-debuginfo-239-45.el8.ppc64le.rpm\nsystemd-debuginfo-239-45.el8.ppc64le.rpm\nsystemd-debugsource-239-45.el8.ppc64le.rpm\nsystemd-devel-239-45.el8.ppc64le.rpm\nsystemd-journal-remote-239-45.el8.ppc64le.rpm\nsystemd-journal-remote-debuginfo-239-45.el8.ppc64le.rpm\nsystemd-libs-239-45.el8.ppc64le.rpm\nsystemd-libs-debuginfo-239-45.el8.ppc64le.rpm\nsystemd-pam-239-45.el8.ppc64le.rpm\nsystemd-pam-debuginfo-239-45.el8.ppc64le.rpm\nsystemd-tests-239-45.el8.ppc64le.rpm\nsystemd-tests-debuginfo-239-45.el8.ppc64le.rpm\nsystemd-udev-239-45.el8.ppc64le.rpm\nsystemd-udev-debuginfo-239-45.el8.ppc64le.rpm\n\ns390x:\nsystemd-239-45.el8.s390x.rpm\nsystemd-container-239-45.el8.s390x.rpm\nsystemd-container-debuginfo-239-45.el8.s390x.rpm\nsystemd-debuginfo-239-45.el8.s390x.rpm\nsystemd-debugsource-239-45.el8.s390x.rpm\nsystemd-devel-239-45.el8.s390x.rpm\nsystemd-journal-remote-239-45.el8.s390x.rpm\nsystemd-journal-remote-debuginfo-239-45.el8.s390x.rpm\nsystemd-libs-239-45.el8.s390x.rpm\nsystemd-libs-debuginfo-239-45.el8.s390x.rpm\nsystemd-pam-239-45.el8.s390x.rpm\nsystemd-pam-debuginfo-239-45.el8.s390x.rpm\nsystemd-tests-239-45.el8.s390x.rpm\nsystemd-tests-debuginfo-239-45.el8.s390x.rpm\nsystemd-udev-239-45.el8.s390x.rpm\nsystemd-udev-debuginfo-239-45.el8.s390x.rpm\n\nx86_64:\nsystemd-239-45.el8.i686.rpm\nsystemd-239-45.el8.x86_64.rpm\nsystemd-container-239-45.el8.i686.rpm\nsystemd-container-239-45.el8.x86_64.rpm\nsystemd-container-debuginfo-239-45.el8.i686.rpm\nsystemd-container-debuginfo-239-45.el8.x86_64.rpm\nsystemd-debuginfo-239-45.el8.i686.rpm\nsystemd-debuginfo-239-45.el8.x86_64.rpm\nsystemd-debugsource-239-45.el8.i686.rpm\nsystemd-debugsource-239-45.el8.x86_64.rpm\nsystemd-devel-239-45.el8.i686.rpm\nsystemd-devel-239-45.el8.x86_64.rpm\nsystemd-journal-remote-239-45.el8.x86_64.rpm\nsystemd-journal-remote-debuginfo-239-45.el8.i686.rpm\nsystemd-journal-remote-debuginfo-239-45.el8.x86_64.rpm\nsystemd-libs-239-45.el8.i686.rpm\nsystemd-libs-239-45.el8.x86_64.rpm\nsystemd-libs-debuginfo-239-45.el8.i686.rpm\nsystemd-libs-debuginfo-239-45.el8.x86_64.rpm\nsystemd-pam-239-45.el8.x86_64.rpm\nsystemd-pam-debuginfo-239-45.el8.i686.rpm\nsystemd-pam-debuginfo-239-45.el8.x86_64.rpm\nsystemd-tests-239-45.el8.x86_64.rpm\nsystemd-tests-debuginfo-239-45.el8.i686.rpm\nsystemd-tests-debuginfo-239-45.el8.x86_64.rpm\nsystemd-udev-239-45.el8.x86_64.rpm\nsystemd-udev-debuginfo-239-45.el8.i686.rpm\nsystemd-udev-debuginfo-239-45.el8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2019-3842\nhttps://access.redhat.com/security/cve/CVE-2020-13776\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2021 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n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\ngSR+956dHOo=K4AI\n-----END PGP SIGNATURE-----\n\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n\n5. \n\nBug Fix(es):\n\n* WMCO patch pub-key-hash annotation to Linux node (BZ#1945248)\n\n* LoadBalancer Service type with invalid external loadbalancer IP breaks\nthe datapath (BZ#1952917)\n\n* Telemetry info not completely available to identify windows nodes\n(BZ#1955319)\n\n* WMCO incorrectly shows node as ready after a failed configuration\n(BZ#1956412)\n\n* kube-proxy service terminated unexpectedly after recreated LB service\n(BZ#1963263)\n\n3. Solution:\n\nFor Windows Machine Config Operator upgrades, see the following\ndocumentation:\n\nhttps://docs.openshift.com/container-platform/4.7/windows_containers/window\ns-node-upgrades.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1945248 - WMCO patch pub-key-hash annotation to Linux node\n1946538 - CVE-2021-25736 kubernetes: LoadBalancer Service type don\u0027t create a HNS policy for empty or invalid external loadbalancer IP, what could lead to MITM\n1952917 - LoadBalancer Service type with invalid external loadbalancer IP breaks the datapath\n1955319 - Telemetry info not completely available to identify windows nodes\n1956412 - WMCO incorrectly shows node as ready after a failed configuration\n1963263 - kube-proxy service terminated unexpectedly after recreated LB service\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1897635 - CVE-2020-28362 golang: math/big: panic during recursive division of very large numbers\n1918750 - CVE-2021-3114 golang: crypto/elliptic: incorrect operations on the P-224 curve\n1928172 - CVE-2020-13949 libthrift: potential DoS when processing untrusted payloads\n1928937 - CVE-2021-23337 nodejs-lodash: command injection via template\n1928954 - CVE-2020-28500 nodejs-lodash: ReDoS via the toNumber, trim and trimEnd functions\n\n5. Description:\n\nRed Hat Advanced Cluster Management for Kubernetes 2.2.4 images\n\nRed Hat Advanced Cluster Management for Kubernetes provides the\ncapabilities to address common challenges that administrators and site\nreliability\nengineers face as they work across a range of public and private cloud\nenvironments. \nClusters and applications are all visible and managed from a single\nconsole\u2014with security policy built in. See\nthe following Release Notes documentation, which will be updated shortly\nfor\nthis release, for additional details about this release:\n\nhttps://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana\ngement_for_kubernetes/2.2/html/release_notes/\n\nSecurity fixes:\n\n* redisgraph-tls: redis: integer overflow when configurable limit for\nmaximum supported bulk input size is too big on 32-bit platforms\n(CVE-2021-21309)\n\n* console-header-container: nodejs-netmask: improper input validation of\noctal input data (CVE-2021-28092)\n\n* console-container: nodejs-is-svg: ReDoS via malicious string\n(CVE-2021-28918)\n\nBug fixes: \n\n* RHACM 2.2.4 images (BZ# 1957254)\n\n* Enabling observability for OpenShift Container Storage with RHACM 2.2 on\nOCP 4.7 (BZ#1950832)\n\n* ACM Operator should support using the default route TLS (BZ# 1955270)\n\n* The scrolling bar for search filter does not work properly (BZ# 1956852)\n\n* Limits on Length of MultiClusterObservability Resource Name (BZ# 1959426)\n\n* The proxy setup in install-config.yaml is not worked when IPI installing\nwith RHACM (BZ# 1960181)\n\n* Unable to make SSH connection to a Bitbucket server (BZ# 1966513)\n\n* Observability Thanos store shard crashing - cannot unmarshall DNS message\n(BZ# 1967890)\n\n3. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):\n\n1932634 - CVE-2021-21309 redis: integer overflow when configurable limit for maximum supported bulk input size is too big on 32-bit platforms\n1939103 - CVE-2021-28092 nodejs-is-svg: ReDoS via malicious string\n1944827 - CVE-2021-28918 nodejs-netmask: improper input validation of octal input data\n1950832 - Enabling observability for OpenShift Container Storage with RHACM 2.2 on OCP 4.7\n1952150 - [DDF] It would be great to see all the options available for the bucket configuration and which attributes are mandatory\n1954506 - [DDF] Table does not contain data about 20 clusters. Now it\u0027s difficult to estimate CPU usage with larger clusters\n1954535 - Reinstall Submariner - No endpoints found on one cluster\n1955270 - ACM Operator should support using the default route TLS\n1956852 - The scrolling bar for search filter does not work properly\n1957254 - RHACM 2.2.4 images\n1959426 - Limits on Length of MultiClusterObservability Resource Name\n1960181 - The proxy setup in install-config.yaml is not worked when IPI installing with RHACM. \n1963128 - [DDF] Please rename this to \"Amazon Elastic Kubernetes Service\"\n1966513 - Unable to make SSH connection to a Bitbucket server\n1967357 - [DDF] When I clicked on this yaml, I get a HTTP 404 error. \n1967890 - Observability Thanos store shard crashing - cannot unmarshal DNS message\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n1937901 - CVE-2021-27918 golang: encoding/xml: infinite loop when using xml.NewTokenDecoder with a custom TokenReader\n1958341 - CVE-2021-31525 golang: net/http: panic in ReadRequest and ReadResponse when reading a very large header\n1965503 - CVE-2021-33196 golang: archive/zip: Malformed archive may cause panic or memory exhaustion\n1971445 - Release of OpenShift Serverless Serving 1.16.0\n1971448 - Release of OpenShift Serverless Eventing 1.16.0\n\n5. Description:\n\nRed Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments. \n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.7.13. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/RHSA-2021:2122\n\nSpace precludes documenting all of the container images in this advisory. \nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nThis update fixes the following bug among others:\n\n* Previously, resources for the ClusterOperator were being created early in\nthe update process, which led to update failures when the ClusterOperator\nhad no status condition while Operators were updating. This bug fix changes\nthe timing of when these resources are created. As a result, updates can\ntake place without errors. (BZ#1959238)\n\nSecurity Fix(es):\n\n* gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index\nvalidation (CVE-2021-3121)\n\nYou may download the oc tool and use it to inspect release image metadata\nas follows:\n\n(For x86_64 architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-x86_64\n\nThe image digest is\nsha256:783a2c963f35ccab38e82e6a8c7fa954c3a4551e07d2f43c06098828dd986ed4\n\n(For s390x architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-s390x\n\nThe image digest is\nsha256:4cf44e68413acad063203e1ee8982fd01d8b9c1f8643a5b31cd7ff341b3199cd\n\n(For ppc64le architecture)\n\n $ oc adm release info\nquay.io/openshift-release-dev/ocp-release:4.7.13-ppc64le\n\nThe image digest is\nsha256:d47ce972f87f14f1f3c5d50428d2255d1256dae3f45c938ace88547478643e36\n\nAll OpenShift Container Platform 4.7 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift Console\nor the CLI oc command. Instructions for upgrading a cluster are available\nat\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -between-minor.html#understanding-upgrade-channels_updating-cluster-between\n- -minor\n\n3. Solution:\n\nFor OpenShift Container Platform 4.7 see the following documentation, which\nwill be updated shortly for this release, for important instructions on how\nto upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel\nease-notes.html\n\nDetails on how to access this content are available at\nhttps://docs.openshift.com/container-platform/4.7/updating/updating-cluster\n- -cli.html\n\n4. Bugs fixed (https://bugzilla.redhat.com/):\n\n1921650 - CVE-2021-3121 gogo/protobuf: plugin/unmarshal/unmarshal.go lacks certain index validation\n1923268 - [Assisted-4.7] [Staging] Using two both spelling \"canceled\" \"cancelled\"\n1947216 - [AWS] Missing iam:ListAttachedRolePolicies permission in permissions.go\n1953963 - Enable/Disable host operations returns cluster resource with incomplete hosts list\n1957749 - ovn-kubernetes pod should have CPU and memory requests set but not limits\n1959238 - CVO creating cloud-controller-manager too early causing upgrade failures\n1960103 - SR-IOV obliviously reboot the node\n1961941 - Local Storage Operator using LocalVolume CR fails to create PV\u0027s when backend storage failure is simulated\n1962302 - packageserver clusteroperator does not set reason or message for Available condition\n1962312 - Deployment considered unhealthy despite being available and at latest generation\n1962435 - Public DNS records were not deleted when destroying a cluster which is using byo private hosted zone\n1963115 - Test verify /run filesystem contents failing\n\n5. Summary:\n\nRelease of components for the Service Telemetry Framework\n\n2. Description:\n\nService Telemetry Framework (STF) provides automated collection of\nmeasurements and data from remote clients, such as Red Hat OpenStack\nPlatform or third-party nodes. \n\nBug fixes:\n\n* STF 1.3.3 now supports OpenShift Container Platform 4.8 as an\ninstallation platform. (BZ#2013268)\n\n* With this update, the servicetelemetrys.infra.watch CRD has a validation\nthat limits the clouds[].name to 10 characters and alphanumeric to avoid\nissues with extra characters in the cloud name and names being too long. \n(BZ#2011603)\n\n* Previously, when you installed STF without having Elastic Cloud on\nKubernetes (ECK) Operator installed, the following error message was\nreturned: \"Failed to find exact match for\nelasticsearch.k8s.elastic.co/v1beta1.Elasticsearch\". The error was as a\nresult of Service Telemetry Operator trying to look up information from a\nnon-existent API interface. \n\nWith this update, the Service Telemetry Operator verifies that the API\nexists before it attempts to make requests to the API interface that is\nprovided by ECK. (BZ#1959166)\n\n3. \nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally. Bugs fixed (https://bugzilla.redhat.com/):\n\n1959166 - Service Telemetry Operator can error out if ElasticSearch (ECK) CRD is not installed\n1983596 - CVE-2021-34558 golang: crypto/tls: certificate of wrong type is causing TLS client to panic\n2011603 - STF multi-cloud setup misinterprets name if a \"-\" is being used\n2013268 - [RFE] Support STF 1.3 on OCP 4.8\n\n5",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3842"
},
{
"db": "CNVD",
"id": "CNVD-2019-14937"
},
{
"db": "VULMON",
"id": "CVE-2019-3842"
},
{
"db": "PACKETSTORM",
"id": "162627"
},
{
"db": "PACKETSTORM",
"id": "162837"
},
{
"db": "PACKETSTORM",
"id": "163257"
},
{
"db": "PACKETSTORM",
"id": "163276"
},
{
"db": "PACKETSTORM",
"id": "163188"
},
{
"db": "PACKETSTORM",
"id": "163496"
},
{
"db": "PACKETSTORM",
"id": "162877"
},
{
"db": "PACKETSTORM",
"id": "164553"
},
{
"db": "PACKETSTORM",
"id": "164901"
}
],
"trust": 2.34
},
"exploit_availability": {
"_id": null,
"data": [
{
"reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=46743",
"trust": 0.1,
"type": "exploit"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2019-3842"
}
]
},
"external_ids": {
"_id": null,
"data": [
{
"db": "NVD",
"id": "CVE-2019-3842",
"trust": 2.6
},
{
"db": "EXPLOIT-DB",
"id": "46743",
"trust": 1.1
},
{
"db": "PACKETSTORM",
"id": "152610",
"trust": 1.1
},
{
"db": "CNVD",
"id": "CNVD-2019-14937",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2019-3842",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "162627",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "162837",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163257",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163276",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163188",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "163496",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "162877",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "164553",
"trust": 0.1
},
{
"db": "PACKETSTORM",
"id": "164901",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14937"
},
{
"db": "VULMON",
"id": "CVE-2019-3842"
},
{
"db": "PACKETSTORM",
"id": "162627"
},
{
"db": "PACKETSTORM",
"id": "162837"
},
{
"db": "PACKETSTORM",
"id": "163257"
},
{
"db": "PACKETSTORM",
"id": "163276"
},
{
"db": "PACKETSTORM",
"id": "163188"
},
{
"db": "PACKETSTORM",
"id": "163496"
},
{
"db": "PACKETSTORM",
"id": "162877"
},
{
"db": "PACKETSTORM",
"id": "164553"
},
{
"db": "PACKETSTORM",
"id": "164901"
},
{
"db": "NVD",
"id": "CVE-2019-3842"
}
]
},
"id": "VAR-201904-0347",
"iot": {
"_id": null,
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14937"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"_id": null,
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14937"
}
]
},
"last_update_date": "2026-03-09T23:24:28.015000Z",
"patch": {
"_id": null,
"data": [
{
"title": "Patch for systemd permission and access control issue vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/161823"
},
{
"title": "Ubuntu Security Notice: systemd vulnerability",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-3938-1"
},
{
"title": "Debian Security Advisories: DSA-4428-1 systemd -- security update",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=5c365eb29a9f32b7a81ec971ccdd9c30"
},
{
"title": "Amazon Linux 2: ALAS2-2022-1854",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALAS2-2022-1854"
},
{
"title": "IBM: Security Bulletin: Multiple vulnerabilities affect IBM Cloud Object Storage Systems (February 2020v1)",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=979e60202a29c3c55731e37f8ddc5a3b"
},
{
"title": "IBM: IBM Security Bulletin: Vyatta 5600 vRouter Software Patches \u2013 Releases 1801-w and 1801-y",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=ibm_psirt_blog\u0026qid=bf3f2299a8658b7cd3984c40e7060666"
},
{
"title": "",
"trust": 0.1,
"url": "https://github.com/vincent-deng/veracode-container-security-finding-parser "
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14937"
},
{
"db": "VULMON",
"id": "CVE-2019-3842"
}
]
},
"problemtype_data": {
"_id": null,
"data": [
{
"problemtype": "CWE-285",
"trust": 1.0
},
{
"problemtype": "CWE-863",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2019-3842"
}
]
},
"references": {
"_id": null,
"data": [
{
"trust": 1.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-3842"
},
{
"trust": 1.1,
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=cve-2019-3842"
},
{
"trust": 1.1,
"url": "https://www.exploit-db.com/exploits/46743/"
},
{
"trust": 1.1,
"url": "http://packetstormsecurity.com/files/152610/systemd-seat-verification-active-session-spoofing.html"
},
{
"trust": 1.1,
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"
},
{
"trust": 1.1,
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"
},
{
"trust": 1.1,
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/str36rje4zziormdxrervbhmprnrthac/"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3cissues.bookkeeper.apache.org%3e"
},
{
"trust": 1.1,
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3cissues.bookkeeper.apache.org%3e"
},
{
"trust": 0.9,
"url": "https://access.redhat.com/security/team/contact/"
},
{
"trust": 0.9,
"url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce"
},
{
"trust": 0.9,
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"trust": 0.9,
"url": "https://bugzilla.redhat.com/):"
},
{
"trust": 0.9,
"url": "https://access.redhat.com/security/cve/cve-2019-3842"
},
{
"trust": 0.9,
"url": "https://access.redhat.com/security/cve/cve-2020-13776"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13776"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-8286"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-28196"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-15358"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-13434"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-24977"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-8231"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-29362"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-8285"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2016-10228"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2019-9169"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25013"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-29361"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-9169"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2021-3326"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2019-25013"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2019-2708"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-8927"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-29363"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-2708"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2016-10228"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-8284"
},
{
"trust": 0.6,
"url": "https://access.redhat.com/security/cve/cve-2020-27618"
},
{
"trust": 0.5,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13434"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2020-26116"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2020-27619"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2021-3177"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2021-23336"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-15358"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2017-14502"
},
{
"trust": 0.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2017-14502"
},
{
"trust": 0.4,
"url": "https://access.redhat.com/security/cve/cve-2021-27219"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2021-20305"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-10878"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-26137"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-12362"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-10543"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12362"
},
{
"trust": 0.3,
"url": "https://access.redhat.com/security/cve/cve-2020-10543"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-10878"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-29362"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-8284"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-8285"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-8286"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-27618"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-8927"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-29363"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-8231"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24977"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-29361"
},
{
"trust": 0.3,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-28196"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/articles/11258"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/team/key/"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14347"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-36322"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-12114"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-25712"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12114"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-13543"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-27835"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-9951"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-25704"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3121"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-19528"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-9948"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-13012"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-0431"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14363"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-13584"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-18811"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14360"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-19528"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-12464"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14314"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14356"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-27786"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-25643"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-9983"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24394"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-0431"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-0342"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-18811"
},
{
"trust": 0.2,
"url": "https://docs.openshift.com/container-platform/4.7/release_notes/ocp-4-7-rel"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14345"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14344"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-19523"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14362"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14361"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-25285"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-35508"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-25212"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-19523"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-28974"
},
{
"trust": 0.2,
"url": "https://issues.jboss.org/):"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-15437"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-13012"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-25284"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-14346"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-11608"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-11608"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12464"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-27219"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-20305"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3326"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3449"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3450"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-3114"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-28362"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25039"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25037"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25037"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-28935"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25034"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25035"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-14866"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25038"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14866"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25040"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24330"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25042"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25042"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25038"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25032"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25041"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25036"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25032"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2021-25215"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24331"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25036"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25035"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2020-24332"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25039"
},
{
"trust": 0.2,
"url": "https://access.redhat.com/security/cve/cve-2019-25040"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25041"
},
{
"trust": 0.2,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-25034"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/863.html"
},
{
"trust": 0.1,
"url": "https://usn.ubuntu.com/3938-1/"
},
{
"trust": 0.1,
"url": "https://tools.cisco.com/security/center/viewalert.x?alertid=59981"
},
{
"trust": 0.1,
"url": "https://www.exploit-db.com/exploits/46743"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:1611"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14346"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14345"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13543"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13584"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14347"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14360"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2136"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14314"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14344"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.7/logging/cluster-logging-u"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-14356"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-25736"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3450"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2130"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.7/windows_containers/window"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-25736"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3449"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-28500"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-28500"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-26116"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-13949"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-28362"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.7/jaeger/jaeger_install/rhb"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2543"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-23336"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-13949"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-27619"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-23337"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21639"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12364"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-28165"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-28092"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-12363"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-24330"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-28163"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_mana"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21309"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21640"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-28918"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3543"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3501"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-25648"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-8648"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27170"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-25692"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-2433"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3347"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-12363"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-12364"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2461"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-27918"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2705"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-31525"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-31525"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.7/html/serverless/index"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-27918"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/documentation/en-us/openshift_container_platform/4.6/html/serverless/index"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-33196"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-33196"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-15586"
},
{
"trust": 0.1,
"url": "https://docs.openshift.com/container-platform/4.7/updating/updating-cluster"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-36242"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-16845"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21645"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-27783"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2020-25659"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21643"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-30465"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21644"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2121"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:2122"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-21642"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:3900"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/errata/rhsa-2021:4582"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-34558"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-22923"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-22922"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-3620"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-22922"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-3620"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-34558"
},
{
"trust": 0.1,
"url": "https://access.redhat.com/security/cve/cve-2021-22923"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14937"
},
{
"db": "VULMON",
"id": "CVE-2019-3842"
},
{
"db": "PACKETSTORM",
"id": "162627"
},
{
"db": "PACKETSTORM",
"id": "162837"
},
{
"db": "PACKETSTORM",
"id": "163257"
},
{
"db": "PACKETSTORM",
"id": "163276"
},
{
"db": "PACKETSTORM",
"id": "163188"
},
{
"db": "PACKETSTORM",
"id": "163496"
},
{
"db": "PACKETSTORM",
"id": "162877"
},
{
"db": "PACKETSTORM",
"id": "164553"
},
{
"db": "PACKETSTORM",
"id": "164901"
},
{
"db": "NVD",
"id": "CVE-2019-3842"
}
]
},
"sources": {
"_id": null,
"data": [
{
"db": "CNVD",
"id": "CNVD-2019-14937",
"ident": null
},
{
"db": "VULMON",
"id": "CVE-2019-3842",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "162627",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "162837",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "163257",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "163276",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "163188",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "163496",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "162877",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "164553",
"ident": null
},
{
"db": "PACKETSTORM",
"id": "164901",
"ident": null
},
{
"db": "NVD",
"id": "CVE-2019-3842",
"ident": null
}
]
},
"sources_release_date": {
"_id": null,
"data": [
{
"date": "2019-05-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-14937",
"ident": null
},
{
"date": "2019-04-09T00:00:00",
"db": "VULMON",
"id": "CVE-2019-3842",
"ident": null
},
{
"date": "2021-05-19T13:56:29",
"db": "PACKETSTORM",
"id": "162627",
"ident": null
},
{
"date": "2021-05-27T13:28:54",
"db": "PACKETSTORM",
"id": "162837",
"ident": null
},
{
"date": "2021-06-23T15:44:15",
"db": "PACKETSTORM",
"id": "163257",
"ident": null
},
{
"date": "2021-06-24T17:54:53",
"db": "PACKETSTORM",
"id": "163276",
"ident": null
},
{
"date": "2021-06-17T17:53:22",
"db": "PACKETSTORM",
"id": "163188",
"ident": null
},
{
"date": "2021-07-14T15:02:07",
"db": "PACKETSTORM",
"id": "163496",
"ident": null
},
{
"date": "2021-06-01T14:45:29",
"db": "PACKETSTORM",
"id": "162877",
"ident": null
},
{
"date": "2021-10-19T15:31:34",
"db": "PACKETSTORM",
"id": "164553",
"ident": null
},
{
"date": "2021-11-10T17:15:07",
"db": "PACKETSTORM",
"id": "164901",
"ident": null
},
{
"date": "2019-04-09T21:29:03.443000",
"db": "NVD",
"id": "CVE-2019-3842",
"ident": null
}
]
},
"sources_update_date": {
"_id": null,
"data": [
{
"date": "2019-05-21T00:00:00",
"db": "CNVD",
"id": "CNVD-2019-14937",
"ident": null
},
{
"date": "2023-11-07T00:00:00",
"db": "VULMON",
"id": "CVE-2019-3842",
"ident": null
},
{
"date": "2024-11-21T04:42:40.903000",
"db": "NVD",
"id": "CVE-2019-3842",
"ident": null
}
]
},
"threat_type": {
"_id": null,
"data": "remote",
"sources": [
{
"db": "PACKETSTORM",
"id": "164901"
}
],
"trust": 0.1
},
"title": {
"_id": null,
"data": "Systemd permission and access control issue vulnerability",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2019-14937"
}
],
"trust": 0.6
},
"type": {
"_id": null,
"data": "spoof",
"sources": [
{
"db": "PACKETSTORM",
"id": "162627"
},
{
"db": "PACKETSTORM",
"id": "164553"
}
],
"trust": 0.2
}
}
WID-SEC-W-2025-0227
Vulnerability from csaf_certbund - Published: 2021-11-30 23:00 - Updated: 2025-01-30 23:00In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuführen, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
In IBM QRadar SIEM existiert eine Schwachstelle. Es werden unsichere Kryptoalgorithmen genutzt. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen.
In IBM QRadar SIEM existiert eine Schwachstelle. Die Schwachstellen ist auf eine fehlende Authentisierung beim Schlüsselaustausch zurückzuführen. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen.
In IBM QRadar SIEM existiert eine Schwachstelle. Die Schwachstelle ist auf einen unzureichenden Patch zurückzuführen und ermöglicht einen Server-Site-Request-Forgery (SSRF)-Angriff. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen.
In IBM QRadar SIEM existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden nicht ordnungsgemäß überprüft, bevor sie an den Benutzer zurückgegeben werden. Ein entfernter anonymer Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausführen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0227 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2025-0227.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0227 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0227"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520488 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520488"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520484 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520484"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520490 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520490"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520476 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520476"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520492 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520492"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520478 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520478"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520486 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520486"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520474 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520474"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520472 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520472"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520482 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520482"
},
{
"category": "external",
"summary": "IBM Security Bulletin: 6520480 vom 2021-11-30",
"url": "https://www.ibm.com/support/pages/node/6520480"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182001 vom 2025-01-30",
"url": "https://www.ibm.com/support/pages/node/7182001"
}
],
"source_lang": "en-US",
"title": "IBM QRadar SIEM: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-30T23:00:00.000+00:00",
"generator": {
"date": "2025-01-31T09:11:30.679+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2025-0227",
"initial_release_date": "2021-11-30T23:00:00.000+00:00",
"revision_history": [
{
"date": "2021-11-30T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM QRadar SIEM 7.3",
"product_id": "T014687",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.3"
}
}
},
{
"category": "product_version",
"name": "7.4",
"product": {
"name": "IBM QRadar SIEM 7.4",
"product_id": "T016287",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.4"
}
}
},
{
"category": "product_version",
"name": "7.5.0",
"product": {
"name": "IBM QRadar SIEM 7.5.0",
"product_id": "T023574",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10228",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2016-10228"
},
{
"cve": "CVE-2017-14502",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2017-14502"
},
{
"cve": "CVE-2017-15713",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2017-15713"
},
{
"cve": "CVE-2018-1000858",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-1000858"
},
{
"cve": "CVE-2018-11768",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-11768"
},
{
"cve": "CVE-2018-18751",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-18751"
},
{
"cve": "CVE-2018-20843",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-20843"
},
{
"cve": "CVE-2018-8029",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2018-8029"
},
{
"cve": "CVE-2019-13012",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-13012"
},
{
"cve": "CVE-2019-13050",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-13050"
},
{
"cve": "CVE-2019-13627",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-13627"
},
{
"cve": "CVE-2019-14866",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-14866"
},
{
"cve": "CVE-2019-14889",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-14889"
},
{
"cve": "CVE-2019-15903",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-15903"
},
{
"cve": "CVE-2019-16935",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-16935"
},
{
"cve": "CVE-2019-18276",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-18276"
},
{
"cve": "CVE-2019-19221",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-19221"
},
{
"cve": "CVE-2019-19906",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-19906"
},
{
"cve": "CVE-2019-19956",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-19956"
},
{
"cve": "CVE-2019-20387",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20387"
},
{
"cve": "CVE-2019-20388",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20388"
},
{
"cve": "CVE-2019-20454",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20454"
},
{
"cve": "CVE-2019-20907",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20907"
},
{
"cve": "CVE-2019-20916",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-20916"
},
{
"cve": "CVE-2019-25013",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-25013"
},
{
"cve": "CVE-2019-2708",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-2708"
},
{
"cve": "CVE-2019-3842",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-3842"
},
{
"cve": "CVE-2019-9169",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-9169"
},
{
"cve": "CVE-2019-9924",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2019-9924"
},
{
"cve": "CVE-2020-11080",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-11080"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12363",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-12363"
},
{
"cve": "CVE-2020-12364",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-12364"
},
{
"cve": "CVE-2020-13434",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13434"
},
{
"cve": "CVE-2020-13543",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13543"
},
{
"cve": "CVE-2020-13584",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13584"
},
{
"cve": "CVE-2020-13776",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13776"
},
{
"cve": "CVE-2020-13777",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13777"
},
{
"cve": "CVE-2020-13954",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-13954"
},
{
"cve": "CVE-2020-14352",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-14352"
},
{
"cve": "CVE-2020-14422",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-14422"
},
{
"cve": "CVE-2020-15358",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-15358"
},
{
"cve": "CVE-2020-1730",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-1730"
},
{
"cve": "CVE-2020-24489",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24489"
},
{
"cve": "CVE-2020-24511",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24511"
},
{
"cve": "CVE-2020-24512",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24512"
},
{
"cve": "CVE-2020-24513",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24513"
},
{
"cve": "CVE-2020-24659",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24659"
},
{
"cve": "CVE-2020-24977",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-24977"
},
{
"cve": "CVE-2020-26116",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-26116"
},
{
"cve": "CVE-2020-27170",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-27170"
},
{
"cve": "CVE-2020-27618",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-27618"
},
{
"cve": "CVE-2020-27619",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-27619"
},
{
"cve": "CVE-2020-27777",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-27777"
},
{
"cve": "CVE-2020-28196",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-28196"
},
{
"cve": "CVE-2020-29361",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-29361"
},
{
"cve": "CVE-2020-29362",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-29362"
},
{
"cve": "CVE-2020-29363",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-29363"
},
{
"cve": "CVE-2020-7226",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-7226"
},
{
"cve": "CVE-2020-7595",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-7595"
},
{
"cve": "CVE-2020-8177",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8177"
},
{
"cve": "CVE-2020-8231",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8231"
},
{
"cve": "CVE-2020-8284",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8284"
},
{
"cve": "CVE-2020-8285",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8285"
},
{
"cve": "CVE-2020-8286",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8286"
},
{
"cve": "CVE-2020-8492",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8492"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-8927",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-8927"
},
{
"cve": "CVE-2020-9492",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-9492"
},
{
"cve": "CVE-2020-9948",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-9948"
},
{
"cve": "CVE-2020-9951",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-9951"
},
{
"cve": "CVE-2020-9983",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2020-9983"
},
{
"cve": "CVE-2021-20271",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-20271"
},
{
"cve": "CVE-2021-20305",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-20305"
},
{
"cve": "CVE-2021-2161",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-2161"
},
{
"cve": "CVE-2021-22555",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-22555"
},
{
"cve": "CVE-2021-22696",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-22696"
},
{
"cve": "CVE-2021-23239",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-23239"
},
{
"cve": "CVE-2021-23240",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-23240"
},
{
"cve": "CVE-2021-23336",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-23336"
},
{
"cve": "CVE-2021-28163",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-28163"
},
{
"cve": "CVE-2021-28165",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-28165"
},
{
"cve": "CVE-2021-28169",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-28169"
},
{
"cve": "CVE-2021-29154",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29154"
},
{
"cve": "CVE-2021-29425",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29425"
},
{
"cve": "CVE-2021-29650",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29650"
},
{
"cve": "CVE-2021-30468",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-30468"
},
{
"cve": "CVE-2021-31811",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-31811"
},
{
"cve": "CVE-2021-31812",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-31812"
},
{
"cve": "CVE-2021-32027",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-32027"
},
{
"cve": "CVE-2021-32028",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-32028"
},
{
"cve": "CVE-2021-32399",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-32399"
},
{
"cve": "CVE-2021-3326",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3326"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33503",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-33503"
},
{
"cve": "CVE-2021-3449",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3449"
},
{
"cve": "CVE-2021-3450",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3450"
},
{
"cve": "CVE-2021-3516",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3516"
},
{
"cve": "CVE-2021-3520",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3520"
},
{
"cve": "CVE-2021-3541",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3541"
},
{
"cve": "CVE-2021-3715",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existieren mehrere Schwachstellen. Die Schwachstellen bestehen in verschiedenen Komponenten. Ein entfernter, anonymer oder authentisierter oder lokaler Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, Administratorrechte zu erlangen, beliebigen Programmcode auszuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-3715"
},
{
"cve": "CVE-2021-20400",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existiert eine Schwachstelle. Es werden unsichere Kryptoalgorithmen genutzt. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-20400"
},
{
"cve": "CVE-2021-29779",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existiert eine Schwachstelle. Die Schwachstellen ist auf eine fehlende Authentisierung beim Schl\u00fcsselaustausch zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29779"
},
{
"cve": "CVE-2021-29863",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existiert eine Schwachstelle. Die Schwachstelle ist auf einen unzureichenden Patch zur\u00fcckzuf\u00fchren und erm\u00f6glicht einen Server-Site-Request-Forgery (SSRF)-Angriff. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Informationen offenzulegen."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29863"
},
{
"cve": "CVE-2021-29849",
"notes": [
{
"category": "description",
"text": "In IBM QRadar SIEM existiert eine Cross-Site Scripting Schwachstelle. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter anonymer Angreifer kann durch Ausnutzung dieser Schwachstelle beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T014687",
"T023574",
"T016287"
]
},
"release_date": "2021-11-30T23:00:00.000+00:00",
"title": "CVE-2021-29849"
}
]
}
MSRC_CVE-2019-3842
Vulnerability from csaf_microsoft - Published: 2019-04-02 00:00 - Updated: 2020-08-18 00:00| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2019-3842 In systemd before v242-rc4 it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker in some particular configurations to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\". - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2019/msrc_cve-2019-3842.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "In systemd before v242-rc4 it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker in some particular configurations to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"tracking": {
"current_release_date": "2020-08-18T00:00:00.000Z",
"generator": {
"date": "2025-12-27T22:48:20.708Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2019-3842",
"initial_release_date": "2019-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2020-08-18T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 systemd 239-34",
"product": {
"name": "\u003ccm1 systemd 239-34",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cm1 systemd 239-34",
"product": {
"name": "cm1 systemd 239-34",
"product_id": "17047"
}
}
],
"category": "product_name",
"name": "systemd"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 systemd 239-34 as a component of CBL Mariner 1.0",
"product_id": "16820-1"
},
"product_reference": "1",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 systemd 239-34 as a component of CBL Mariner 1.0",
"product_id": "17047-16820"
},
"product_reference": "17047",
"relates_to_product_reference": "16820"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-3842",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"17047-16820"
],
"known_affected": [
"16820-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2019-3842 In systemd before v242-rc4 it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker in some particular configurations to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\". - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2019/msrc_cve-2019-3842.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2020-08-18T00:00:00.000Z",
"details": "-:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"16820-1"
]
}
],
"title": "In systemd before v242-rc4 it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker in some particular configurations to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"."
}
]
}
FKIE_CVE-2019-3842
Vulnerability from fkie_nvd - Published: 2019-04-09 21:29 - Updated: 2024-11-21 04:42| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html | Third Party Advisory | |
| secalert@redhat.com | http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html | Exploit, Third Party Advisory, VDB Entry | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
| secalert@redhat.com | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
| secalert@redhat.com | https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html | Third Party Advisory | |
| secalert@redhat.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/ | ||
| secalert@redhat.com | https://www.exploit-db.com/exploits/46743/ | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html | Exploit, Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://www.exploit-db.com/exploits/46743/ | Exploit, Third Party Advisory, VDB Entry |
| Vendor | Product | Version | |
|---|---|---|---|
| systemd_project | systemd | * | |
| systemd_project | systemd | 242 | |
| systemd_project | systemd | 242 | |
| systemd_project | systemd | 242 | |
| redhat | enterprise_linux | 7.0 | |
| fedoraproject | fedora | 30 | |
| debian | debian_linux | 8.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*",
"matchCriteriaId": "02E0A07B-34D3-403B-A503-CB11C9203FE9",
"versionEndIncluding": "241",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3E2ACFB1-6787-47D0-B7F3-CF4F129732A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*",
"matchCriteriaId": "22EB9C1F-9101-4AD5-80FD-CB5EA224A13F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9A203307-2242-475A-8ADF-3A1D112655D5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"."
},
{
"lang": "es",
"value": "En systemd anterior de la versi\u00f3n v242-rc4, fue encontrado que pam_systemd no sanea apropiadamente el entorno anterior usando la variable XDG_SEAT. Es posible que un atacante, en ciertas configuraciones particulares, establezca una variable de entorno XDG_SEAT que permita comprobar los comandos contra las pol\u00edticas polkit utilizando el elemento \"allow_active\" en lugar de \"allow_any\"."
}
],
"id": "CVE-2019-3842",
"lastModified": "2024-11-21T04:42:40.903",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"exploitabilityScore": 1.0,
"impactScore": 3.4,
"source": "secalert@redhat.com",
"type": "Secondary"
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-04-09T21:29:03.443",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/46743/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/46743/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-285"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-863"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
RHSA-2021:1611
Vulnerability from csaf_redhat - Published: 2021-05-18 15:28 - Updated: 2025-11-21 18:22It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or "0x" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for systemd is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.4 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:1611",
"url": "https://access.redhat.com/errata/RHSA-2021:1611"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.4_release_notes/"
},
{
"category": "external",
"summary": "1668521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668521"
},
{
"category": "external",
"summary": "1740657",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1740657"
},
{
"category": "external",
"summary": "1755287",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1755287"
},
{
"category": "external",
"summary": "1764282",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1764282"
},
{
"category": "external",
"summary": "1812972",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1812972"
},
{
"category": "external",
"summary": "1819868",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1819868"
},
{
"category": "external",
"summary": "1845534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845534"
},
{
"category": "external",
"summary": "1862714",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1862714"
},
{
"category": "external",
"summary": "1865840",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1865840"
},
{
"category": "external",
"summary": "1868831",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868831"
},
{
"category": "external",
"summary": "1868877",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1868877"
},
{
"category": "external",
"summary": "1870638",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1870638"
},
{
"category": "external",
"summary": "1871139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1871139"
},
{
"category": "external",
"summary": "1880270",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1880270"
},
{
"category": "external",
"summary": "1885553",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1885553"
},
{
"category": "external",
"summary": "1887181",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1887181"
},
{
"category": "external",
"summary": "1888912",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1888912"
},
{
"category": "external",
"summary": "1889996",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1889996"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_1611.json"
}
],
"title": "Red Hat Security Advisory: systemd security, bug fix, and enhancement update",
"tracking": {
"current_release_date": "2025-11-21T18:22:05+00:00",
"generator": {
"date": "2025-11-21T18:22:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:1611",
"initial_release_date": "2021-05-18T15:28:44+00:00",
"revision_history": [
{
"date": "2021-05-18T15:28:44+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-05-18T15:28:44+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:22:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-45.el8.src",
"product": {
"name": "systemd-0:239-45.el8.src",
"product_id": "systemd-0:239-45.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-45.el8.aarch64",
"product": {
"name": "systemd-0:239-45.el8.aarch64",
"product_id": "systemd-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-45.el8.aarch64",
"product": {
"name": "systemd-container-0:239-45.el8.aarch64",
"product_id": "systemd-container-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-45.el8.aarch64",
"product": {
"name": "systemd-devel-0:239-45.el8.aarch64",
"product_id": "systemd-devel-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-0:239-45.el8.aarch64",
"product": {
"name": "systemd-journal-remote-0:239-45.el8.aarch64",
"product_id": "systemd-journal-remote-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-45.el8.aarch64",
"product": {
"name": "systemd-libs-0:239-45.el8.aarch64",
"product_id": "systemd-libs-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-0:239-45.el8.aarch64",
"product": {
"name": "systemd-pam-0:239-45.el8.aarch64",
"product_id": "systemd-pam-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-0:239-45.el8.aarch64",
"product": {
"name": "systemd-tests-0:239-45.el8.aarch64",
"product_id": "systemd-tests-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-0:239-45.el8.aarch64",
"product": {
"name": "systemd-udev-0:239-45.el8.aarch64",
"product_id": "systemd-udev-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-45.el8.aarch64",
"product": {
"name": "systemd-debugsource-0:239-45.el8.aarch64",
"product_id": "systemd-debugsource-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-45.el8.aarch64",
"product": {
"name": "systemd-container-debuginfo-0:239-45.el8.aarch64",
"product_id": "systemd-container-debuginfo-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-45.el8.aarch64",
"product": {
"name": "systemd-debuginfo-0:239-45.el8.aarch64",
"product_id": "systemd-debuginfo-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-45.el8.aarch64",
"product": {
"name": "systemd-libs-debuginfo-0:239-45.el8.aarch64",
"product_id": "systemd-libs-debuginfo-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-45.el8.aarch64",
"product": {
"name": "systemd-pam-debuginfo-0:239-45.el8.aarch64",
"product_id": "systemd-pam-debuginfo-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-45.el8.aarch64",
"product": {
"name": "systemd-tests-debuginfo-0:239-45.el8.aarch64",
"product_id": "systemd-tests-debuginfo-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-45.el8.aarch64",
"product": {
"name": "systemd-udev-debuginfo-0:239-45.el8.aarch64",
"product_id": "systemd-udev-debuginfo-0:239-45.el8.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-0:239-45.el8.ppc64le",
"product_id": "systemd-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-container-0:239-45.el8.ppc64le",
"product_id": "systemd-container-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-devel-0:239-45.el8.ppc64le",
"product_id": "systemd-devel-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-journal-remote-0:239-45.el8.ppc64le",
"product_id": "systemd-journal-remote-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-libs-0:239-45.el8.ppc64le",
"product_id": "systemd-libs-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-pam-0:239-45.el8.ppc64le",
"product_id": "systemd-pam-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-tests-0:239-45.el8.ppc64le",
"product_id": "systemd-tests-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-udev-0:239-45.el8.ppc64le",
"product_id": "systemd-udev-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-debugsource-0:239-45.el8.ppc64le",
"product_id": "systemd-debugsource-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-container-debuginfo-0:239-45.el8.ppc64le",
"product_id": "systemd-container-debuginfo-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-debuginfo-0:239-45.el8.ppc64le",
"product_id": "systemd-debuginfo-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"product_id": "systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"product_id": "systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"product_id": "systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"product": {
"name": "systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"product_id": "systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-45.el8.i686",
"product": {
"name": "systemd-0:239-45.el8.i686",
"product_id": "systemd-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-45.el8.i686",
"product": {
"name": "systemd-container-0:239-45.el8.i686",
"product_id": "systemd-container-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-45.el8.i686",
"product": {
"name": "systemd-devel-0:239-45.el8.i686",
"product_id": "systemd-devel-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-45.el8.i686",
"product": {
"name": "systemd-libs-0:239-45.el8.i686",
"product_id": "systemd-libs-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-45.el8.i686",
"product": {
"name": "systemd-debugsource-0:239-45.el8.i686",
"product_id": "systemd-debugsource-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-45.el8.i686",
"product": {
"name": "systemd-container-debuginfo-0:239-45.el8.i686",
"product_id": "systemd-container-debuginfo-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-45.el8.i686",
"product": {
"name": "systemd-debuginfo-0:239-45.el8.i686",
"product_id": "systemd-debuginfo-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-45.el8.i686",
"product": {
"name": "systemd-libs-debuginfo-0:239-45.el8.i686",
"product_id": "systemd-libs-debuginfo-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-45.el8.i686",
"product": {
"name": "systemd-pam-debuginfo-0:239-45.el8.i686",
"product_id": "systemd-pam-debuginfo-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-45.el8.i686",
"product": {
"name": "systemd-tests-debuginfo-0:239-45.el8.i686",
"product_id": "systemd-tests-debuginfo-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-45.el8.i686",
"product": {
"name": "systemd-udev-debuginfo-0:239-45.el8.i686",
"product_id": "systemd-udev-debuginfo-0:239-45.el8.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-45.el8.x86_64",
"product": {
"name": "systemd-0:239-45.el8.x86_64",
"product_id": "systemd-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-45.el8.x86_64",
"product": {
"name": "systemd-container-0:239-45.el8.x86_64",
"product_id": "systemd-container-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-45.el8.x86_64",
"product": {
"name": "systemd-devel-0:239-45.el8.x86_64",
"product_id": "systemd-devel-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-0:239-45.el8.x86_64",
"product": {
"name": "systemd-journal-remote-0:239-45.el8.x86_64",
"product_id": "systemd-journal-remote-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-45.el8.x86_64",
"product": {
"name": "systemd-libs-0:239-45.el8.x86_64",
"product_id": "systemd-libs-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-0:239-45.el8.x86_64",
"product": {
"name": "systemd-pam-0:239-45.el8.x86_64",
"product_id": "systemd-pam-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-0:239-45.el8.x86_64",
"product": {
"name": "systemd-tests-0:239-45.el8.x86_64",
"product_id": "systemd-tests-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-0:239-45.el8.x86_64",
"product": {
"name": "systemd-udev-0:239-45.el8.x86_64",
"product_id": "systemd-udev-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-45.el8.x86_64",
"product": {
"name": "systemd-debugsource-0:239-45.el8.x86_64",
"product_id": "systemd-debugsource-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-45.el8.x86_64",
"product": {
"name": "systemd-container-debuginfo-0:239-45.el8.x86_64",
"product_id": "systemd-container-debuginfo-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-45.el8.x86_64",
"product": {
"name": "systemd-debuginfo-0:239-45.el8.x86_64",
"product_id": "systemd-debuginfo-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-45.el8.x86_64",
"product": {
"name": "systemd-libs-debuginfo-0:239-45.el8.x86_64",
"product_id": "systemd-libs-debuginfo-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-45.el8.x86_64",
"product": {
"name": "systemd-pam-debuginfo-0:239-45.el8.x86_64",
"product_id": "systemd-pam-debuginfo-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-45.el8.x86_64",
"product": {
"name": "systemd-tests-debuginfo-0:239-45.el8.x86_64",
"product_id": "systemd-tests-debuginfo-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-45.el8.x86_64",
"product": {
"name": "systemd-udev-debuginfo-0:239-45.el8.x86_64",
"product_id": "systemd-udev-debuginfo-0:239-45.el8.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-45.el8.s390x",
"product": {
"name": "systemd-0:239-45.el8.s390x",
"product_id": "systemd-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-45.el8.s390x",
"product": {
"name": "systemd-container-0:239-45.el8.s390x",
"product_id": "systemd-container-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-45.el8.s390x",
"product": {
"name": "systemd-devel-0:239-45.el8.s390x",
"product_id": "systemd-devel-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-0:239-45.el8.s390x",
"product": {
"name": "systemd-journal-remote-0:239-45.el8.s390x",
"product_id": "systemd-journal-remote-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-45.el8.s390x",
"product": {
"name": "systemd-libs-0:239-45.el8.s390x",
"product_id": "systemd-libs-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-0:239-45.el8.s390x",
"product": {
"name": "systemd-pam-0:239-45.el8.s390x",
"product_id": "systemd-pam-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-0:239-45.el8.s390x",
"product": {
"name": "systemd-tests-0:239-45.el8.s390x",
"product_id": "systemd-tests-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-0:239-45.el8.s390x",
"product": {
"name": "systemd-udev-0:239-45.el8.s390x",
"product_id": "systemd-udev-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-45.el8.s390x",
"product": {
"name": "systemd-debugsource-0:239-45.el8.s390x",
"product_id": "systemd-debugsource-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-45.el8.s390x",
"product": {
"name": "systemd-container-debuginfo-0:239-45.el8.s390x",
"product_id": "systemd-container-debuginfo-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-45.el8.s390x",
"product": {
"name": "systemd-debuginfo-0:239-45.el8.s390x",
"product_id": "systemd-debuginfo-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"product_id": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-45.el8.s390x",
"product": {
"name": "systemd-libs-debuginfo-0:239-45.el8.s390x",
"product_id": "systemd-libs-debuginfo-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-45.el8.s390x",
"product": {
"name": "systemd-pam-debuginfo-0:239-45.el8.s390x",
"product_id": "systemd-pam-debuginfo-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-45.el8.s390x",
"product": {
"name": "systemd-tests-debuginfo-0:239-45.el8.s390x",
"product_id": "systemd-tests-debuginfo-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-45.el8?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-45.el8.s390x",
"product": {
"name": "systemd-udev-debuginfo-0:239-45.el8.s390x",
"product_id": "systemd-udev-debuginfo-0:239-45.el8.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-45.el8?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64"
},
"product_reference": "systemd-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686"
},
"product_reference": "systemd-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x"
},
"product_reference": "systemd-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-45.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.src"
},
"product_reference": "systemd-0:239-45.el8.src",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64"
},
"product_reference": "systemd-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64"
},
"product_reference": "systemd-container-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686"
},
"product_reference": "systemd-container-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-container-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x"
},
"product_reference": "systemd-container-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64"
},
"product_reference": "systemd-container-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64"
},
"product_reference": "systemd-container-debuginfo-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686"
},
"product_reference": "systemd-container-debuginfo-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-container-debuginfo-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x"
},
"product_reference": "systemd-container-debuginfo-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64"
},
"product_reference": "systemd-container-debuginfo-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64"
},
"product_reference": "systemd-debuginfo-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686"
},
"product_reference": "systemd-debuginfo-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-debuginfo-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x"
},
"product_reference": "systemd-debuginfo-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64"
},
"product_reference": "systemd-debuginfo-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64"
},
"product_reference": "systemd-debugsource-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686"
},
"product_reference": "systemd-debugsource-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-debugsource-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x"
},
"product_reference": "systemd-debugsource-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64"
},
"product_reference": "systemd-debugsource-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64"
},
"product_reference": "systemd-devel-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686"
},
"product_reference": "systemd-devel-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-devel-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x"
},
"product_reference": "systemd-devel-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64"
},
"product_reference": "systemd-devel-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64"
},
"product_reference": "systemd-journal-remote-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-journal-remote-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x"
},
"product_reference": "systemd-journal-remote-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64"
},
"product_reference": "systemd-journal-remote-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64"
},
"product_reference": "systemd-libs-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686"
},
"product_reference": "systemd-libs-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-libs-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x"
},
"product_reference": "systemd-libs-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64"
},
"product_reference": "systemd-libs-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64"
},
"product_reference": "systemd-libs-debuginfo-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686"
},
"product_reference": "systemd-libs-debuginfo-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x"
},
"product_reference": "systemd-libs-debuginfo-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64"
},
"product_reference": "systemd-libs-debuginfo-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64"
},
"product_reference": "systemd-pam-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-pam-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x"
},
"product_reference": "systemd-pam-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64"
},
"product_reference": "systemd-pam-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64"
},
"product_reference": "systemd-pam-debuginfo-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686"
},
"product_reference": "systemd-pam-debuginfo-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x"
},
"product_reference": "systemd-pam-debuginfo-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64"
},
"product_reference": "systemd-pam-debuginfo-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64"
},
"product_reference": "systemd-tests-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-tests-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x"
},
"product_reference": "systemd-tests-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64"
},
"product_reference": "systemd-tests-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64"
},
"product_reference": "systemd-tests-debuginfo-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686"
},
"product_reference": "systemd-tests-debuginfo-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x"
},
"product_reference": "systemd-tests-debuginfo-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64"
},
"product_reference": "systemd-tests-debuginfo-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64"
},
"product_reference": "systemd-udev-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-udev-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x"
},
"product_reference": "systemd-udev-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64"
},
"product_reference": "systemd-udev-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-45.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64"
},
"product_reference": "systemd-udev-debuginfo-0:239-45.el8.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-45.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686"
},
"product_reference": "systemd-udev-debuginfo-0:239-45.el8.i686",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-45.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le"
},
"product_reference": "systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-45.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x"
},
"product_reference": "systemd-udev-debuginfo-0:239-45.el8.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-45.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64"
},
"product_reference": "systemd-udev-debuginfo-0:239-45.el8.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.GA"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
}
],
"cve": "CVE-2019-3842",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2019-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1668521"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.src",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3842"
},
{
"category": "external",
"summary": "RHBZ#1668521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842"
}
],
"release_date": "2019-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-18T15:28:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.src",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1611"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.src",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\""
},
{
"cve": "CVE-2020-13776",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2020-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1845534"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.src",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13776"
},
{
"category": "external",
"summary": "RHBZ#1845534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845534"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13776"
}
],
"release_date": "2020-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-05-18T15:28:44+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.src",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:1611"
},
{
"category": "workaround",
"details": "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).",
"product_ids": [
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.src",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.src",
"BaseOS-8.4.0.GA:systemd-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-container-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-debugsource-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-devel-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-journal-remote-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-libs-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-pam-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-tests-debuginfo-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-0:239-45.el8.x86_64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.aarch64",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.i686",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.ppc64le",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.s390x",
"BaseOS-8.4.0.GA:systemd-udev-debuginfo-0:239-45.el8.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits"
}
]
}
RHSA-2021:3900
Vulnerability from csaf_redhat - Published: 2021-10-19 07:18 - Updated: 2025-11-21 18:25It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or "0x" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.
| URL | Category | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for systemd is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. In addition, it supports snapshotting and restoring of the system state, maintains mount and automount points, and implements an elaborate transactional dependency-based service control logic. It can also work as a drop-in replacement for sysvinit.\n\nSecurity Fix(es):\n\n* systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\" (CVE-2019-3842)\n\n* systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits (CVE-2020-13776)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:3900",
"url": "https://access.redhat.com/errata/RHSA-2021:3900"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1668521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668521"
},
{
"category": "external",
"summary": "1845534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845534"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_3900.json"
}
],
"title": "Red Hat Security Advisory: systemd security update",
"tracking": {
"current_release_date": "2025-11-21T18:25:44+00:00",
"generator": {
"date": "2025-11-21T18:25:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:3900",
"initial_release_date": "2021-10-19T07:18:34+00:00",
"revision_history": [
{
"date": "2021-10-19T07:18:34+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-10-19T07:18:34+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:25:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-31.el8_2.7.src",
"product": {
"name": "systemd-0:239-31.el8_2.7.src",
"product_id": "systemd-0:239-31.el8_2.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-container-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-container-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-devel-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-devel-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-libs-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-libs-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-pam-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-pam-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-tests-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-tests-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-udev-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-udev-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-debugsource-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-debugsource-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"product": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-container-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-container-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-devel-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-devel-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-libs-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-libs-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-pam-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-pam-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-tests-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-tests-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-udev-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-udev-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"product": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-0:239-31.el8_2.7.i686",
"product_id": "systemd-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-container-0:239-31.el8_2.7.i686",
"product_id": "systemd-container-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-devel-0:239-31.el8_2.7.i686",
"product_id": "systemd-devel-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-libs-0:239-31.el8_2.7.i686",
"product_id": "systemd-libs-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-debugsource-0:239-31.el8_2.7.i686",
"product_id": "systemd-debugsource-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.i686",
"product_id": "systemd-debuginfo-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"product": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-container-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-container-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-devel-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-devel-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-libs-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-libs-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-pam-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-pam-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-tests-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-tests-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-udev-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-udev-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-debugsource-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-debugsource-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64",
"product": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64",
"product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "systemd-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-0:239-31.el8_2.7.s390x",
"product_id": "systemd-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-container-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-container-0:239-31.el8_2.7.s390x",
"product_id": "systemd-container-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-devel-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-devel-0:239-31.el8_2.7.s390x",
"product_id": "systemd-devel-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-devel@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-journal-remote-0:239-31.el8_2.7.s390x",
"product_id": "systemd-journal-remote-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-libs-0:239-31.el8_2.7.s390x",
"product_id": "systemd-libs-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-pam-0:239-31.el8_2.7.s390x",
"product_id": "systemd-pam-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-tests-0:239-31.el8_2.7.s390x",
"product_id": "systemd-tests-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-udev-0:239-31.el8_2.7.s390x",
"product_id": "systemd-udev-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-debugsource-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-debugsource-0:239-31.el8_2.7.s390x",
"product_id": "systemd-debugsource-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debugsource@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"product_id": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-container-debuginfo@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-debuginfo-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.s390x",
"product_id": "systemd-debuginfo-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-debuginfo@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"product_id": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-journal-remote-debuginfo@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"product_id": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-libs-debuginfo@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"product_id": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-pam-debuginfo@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"product_id": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-tests-debuginfo@239-31.el8_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"product": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"product_id": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/systemd-udev-debuginfo@239-31.el8_2.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-31.el8_2.7.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src"
},
"product_reference": "systemd-0:239-31.el8_2.7.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-container-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-container-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-container-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-container-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-container-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-debuginfo-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-debuginfo-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-debugsource-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-debugsource-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-debugsource-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-debugsource-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-debugsource-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-devel-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-devel-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-devel-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-devel-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-devel-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-journal-remote-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-libs-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-libs-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-libs-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-libs-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-libs-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-pam-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-pam-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-pam-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-pam-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-tests-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-tests-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-tests-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-tests-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-udev-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-udev-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-udev-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-udev-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64"
},
"product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686"
},
"product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le"
},
"product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x"
},
"product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64"
},
"product_reference": "systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Jann Horn"
],
"organization": "Google Project Zero"
}
],
"cve": "CVE-2019-3842",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2019-01-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1668521"
}
],
"notes": [
{
"category": "description",
"text": "It was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\"",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "For the attack to be successful, a new session must be created by pam_systemd. This is done only if the calling process is not already part of a session. Red Hat Enterprise Linux, in its default PAM configurations, does not let a session sneak in without systemd knowing about it, since pam_systemd is always called in every PAM config file. Unless a wrong PAM config file is in place, this vulnerability cannot be triggered on Red Hat Enterprise Linux 7 and 8.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2019-3842"
},
{
"category": "external",
"summary": "RHBZ#1668521",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1668521"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842"
}
],
"release_date": "2019-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-19T07:18:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3900"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: Spoofing of XDG_SEAT allows for actions to be checked against \"allow_active\" instead of \"allow_any\""
},
{
"cve": "CVE-2020-13776",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"discovery_date": "2020-06-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1845534"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in systemd, where it mishandles numerical usernames beginning with decimal digits, or \"0x\" followed by hexadecimal digits. When the usernames are used by systemd, for example in service units, an unexpected user may be used instead. In some particular configurations, this flaw allows local attackers to elevate their privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw is rated as Moderate because several uncommon conditions have to be met to make it exploitable. Numerical usernames with decimal digits or starting with \"0x\" followed by hexadecimal digits must exist on the system. Systemd would need to process those particular usernames (e.g. while using the `User=` directive in a systemd service unit). If the service was supposed to run as a regular user and the binary being executed can be controlled by a local attacker, he could abuse this flaw to unexpectedly execute code as a root when the service is started. If the service was run as a regular user to limit the impact of a possible flaw in the service, this flaw would not provide the intended additional protection.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2020-13776"
},
{
"category": "external",
"summary": "RHBZ#1845534",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1845534"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2020-13776",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-13776"
}
],
"release_date": "2020-05-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-10-19T07:18:34+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2021:3900"
},
{
"category": "workaround",
"details": "Do not use `User=` directive in services with numerical usernames composed by decimal digits or starting with \"0x\" followed by hexadecimal digits (e.g. 0x[0-9A-Fa-f]+).",
"product_ids": [
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.src",
"BaseOS-8.2.0.Z.EUS:systemd-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-container-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-debugsource-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-devel-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-journal-remote-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-libs-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-pam-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-tests-debuginfo-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-0:239-31.el8_2.7.x86_64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.aarch64",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.i686",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.ppc64le",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.s390x",
"BaseOS-8.2.0.Z.EUS:systemd-udev-debuginfo-0:239-31.el8_2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "systemd: Mishandles numerical usernames beginning with decimal digits or 0x followed by hexadecimal digits"
}
]
}
OPENSUSE-SU-2024:11420-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libsystemd0-249.4-2.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libsystemd0-249.4-2.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11420",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11420-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-10156 page",
"url": "https://www.suse.com/security/cve/CVE-2016-10156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-15908 page",
"url": "https://www.suse.com/security/cve/CVE-2017-15908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18078 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-9445 page",
"url": "https://www.suse.com/security/cve/CVE-2017-9445/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-15686 page",
"url": "https://www.suse.com/security/cve/CVE-2018-15686/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-15687 page",
"url": "https://www.suse.com/security/cve/CVE-2018-15687/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-15688 page",
"url": "https://www.suse.com/security/cve/CVE-2018-15688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16864 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16864/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-16865 page",
"url": "https://www.suse.com/security/cve/CVE-2018-16865/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-21029 page",
"url": "https://www.suse.com/security/cve/CVE-2018-21029/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-6954 page",
"url": "https://www.suse.com/security/cve/CVE-2018-6954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-20386 page",
"url": "https://www.suse.com/security/cve/CVE-2019-20386/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3842 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3842/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3843 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3843/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-3844 page",
"url": "https://www.suse.com/security/cve/CVE-2019-3844/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-6454 page",
"url": "https://www.suse.com/security/cve/CVE-2019-6454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-13529 page",
"url": "https://www.suse.com/security/cve/CVE-2020-13529/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-1712 page",
"url": "https://www.suse.com/security/cve/CVE-2020-1712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33910 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33910/"
}
],
"title": "libsystemd0-249.4-2.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11420-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-249.4-2.2.aarch64",
"product": {
"name": "libsystemd0-249.4-2.2.aarch64",
"product_id": "libsystemd0-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-249.4-2.2.aarch64",
"product": {
"name": "libsystemd0-32bit-249.4-2.2.aarch64",
"product_id": "libsystemd0-32bit-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-devel-249.4-2.2.aarch64",
"product": {
"name": "libudev-devel-249.4-2.2.aarch64",
"product_id": "libudev-devel-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "libudev-devel-32bit-249.4-2.2.aarch64",
"product": {
"name": "libudev-devel-32bit-249.4-2.2.aarch64",
"product_id": "libudev-devel-32bit-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "libudev1-249.4-2.2.aarch64",
"product": {
"name": "libudev1-249.4-2.2.aarch64",
"product_id": "libudev1-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-249.4-2.2.aarch64",
"product": {
"name": "libudev1-32bit-249.4-2.2.aarch64",
"product_id": "libudev1-32bit-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-249.4-2.2.aarch64",
"product": {
"name": "nss-myhostname-249.4-2.2.aarch64",
"product_id": "nss-myhostname-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-32bit-249.4-2.2.aarch64",
"product": {
"name": "nss-myhostname-32bit-249.4-2.2.aarch64",
"product_id": "nss-myhostname-32bit-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-249.4-2.2.aarch64",
"product": {
"name": "nss-mymachines-249.4-2.2.aarch64",
"product_id": "nss-mymachines-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-32bit-249.4-2.2.aarch64",
"product": {
"name": "nss-mymachines-32bit-249.4-2.2.aarch64",
"product_id": "nss-mymachines-32bit-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "nss-resolve-249.4-2.2.aarch64",
"product": {
"name": "nss-resolve-249.4-2.2.aarch64",
"product_id": "nss-resolve-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "nss-systemd-249.4-2.2.aarch64",
"product": {
"name": "nss-systemd-249.4-2.2.aarch64",
"product_id": "nss-systemd-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-249.4-2.2.aarch64",
"product": {
"name": "systemd-249.4-2.2.aarch64",
"product_id": "systemd-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-32bit-249.4-2.2.aarch64",
"product": {
"name": "systemd-32bit-249.4-2.2.aarch64",
"product_id": "systemd-32bit-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-container-249.4-2.2.aarch64",
"product": {
"name": "systemd-container-249.4-2.2.aarch64",
"product_id": "systemd-container-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-coredump-249.4-2.2.aarch64",
"product": {
"name": "systemd-coredump-249.4-2.2.aarch64",
"product_id": "systemd-coredump-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-devel-249.4-2.2.aarch64",
"product": {
"name": "systemd-devel-249.4-2.2.aarch64",
"product_id": "systemd-devel-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-doc-249.4-2.2.aarch64",
"product": {
"name": "systemd-doc-249.4-2.2.aarch64",
"product_id": "systemd-doc-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-experimental-249.4-2.2.aarch64",
"product": {
"name": "systemd-experimental-249.4-2.2.aarch64",
"product_id": "systemd-experimental-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-249.4-2.2.aarch64",
"product": {
"name": "systemd-journal-remote-249.4-2.2.aarch64",
"product_id": "systemd-journal-remote-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-lang-249.4-2.2.aarch64",
"product": {
"name": "systemd-lang-249.4-2.2.aarch64",
"product_id": "systemd-lang-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-logger-249.4-2.2.aarch64",
"product": {
"name": "systemd-logger-249.4-2.2.aarch64",
"product_id": "systemd-logger-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-network-249.4-2.2.aarch64",
"product": {
"name": "systemd-network-249.4-2.2.aarch64",
"product_id": "systemd-network-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-portable-249.4-2.2.aarch64",
"product": {
"name": "systemd-portable-249.4-2.2.aarch64",
"product_id": "systemd-portable-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-249.4-2.2.aarch64",
"product": {
"name": "systemd-sysvinit-249.4-2.2.aarch64",
"product_id": "systemd-sysvinit-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "systemd-testsuite-249.4-2.2.aarch64",
"product": {
"name": "systemd-testsuite-249.4-2.2.aarch64",
"product_id": "systemd-testsuite-249.4-2.2.aarch64"
}
},
{
"category": "product_version",
"name": "udev-249.4-2.2.aarch64",
"product": {
"name": "udev-249.4-2.2.aarch64",
"product_id": "udev-249.4-2.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-249.4-2.2.ppc64le",
"product": {
"name": "libsystemd0-249.4-2.2.ppc64le",
"product_id": "libsystemd0-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-249.4-2.2.ppc64le",
"product": {
"name": "libsystemd0-32bit-249.4-2.2.ppc64le",
"product_id": "libsystemd0-32bit-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-devel-249.4-2.2.ppc64le",
"product": {
"name": "libudev-devel-249.4-2.2.ppc64le",
"product_id": "libudev-devel-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev-devel-32bit-249.4-2.2.ppc64le",
"product": {
"name": "libudev-devel-32bit-249.4-2.2.ppc64le",
"product_id": "libudev-devel-32bit-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev1-249.4-2.2.ppc64le",
"product": {
"name": "libudev1-249.4-2.2.ppc64le",
"product_id": "libudev1-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-249.4-2.2.ppc64le",
"product": {
"name": "libudev1-32bit-249.4-2.2.ppc64le",
"product_id": "libudev1-32bit-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-myhostname-249.4-2.2.ppc64le",
"product": {
"name": "nss-myhostname-249.4-2.2.ppc64le",
"product_id": "nss-myhostname-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-myhostname-32bit-249.4-2.2.ppc64le",
"product": {
"name": "nss-myhostname-32bit-249.4-2.2.ppc64le",
"product_id": "nss-myhostname-32bit-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-mymachines-249.4-2.2.ppc64le",
"product": {
"name": "nss-mymachines-249.4-2.2.ppc64le",
"product_id": "nss-mymachines-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-mymachines-32bit-249.4-2.2.ppc64le",
"product": {
"name": "nss-mymachines-32bit-249.4-2.2.ppc64le",
"product_id": "nss-mymachines-32bit-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-resolve-249.4-2.2.ppc64le",
"product": {
"name": "nss-resolve-249.4-2.2.ppc64le",
"product_id": "nss-resolve-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "nss-systemd-249.4-2.2.ppc64le",
"product": {
"name": "nss-systemd-249.4-2.2.ppc64le",
"product_id": "nss-systemd-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-249.4-2.2.ppc64le",
"product": {
"name": "systemd-249.4-2.2.ppc64le",
"product_id": "systemd-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-32bit-249.4-2.2.ppc64le",
"product": {
"name": "systemd-32bit-249.4-2.2.ppc64le",
"product_id": "systemd-32bit-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-container-249.4-2.2.ppc64le",
"product": {
"name": "systemd-container-249.4-2.2.ppc64le",
"product_id": "systemd-container-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-coredump-249.4-2.2.ppc64le",
"product": {
"name": "systemd-coredump-249.4-2.2.ppc64le",
"product_id": "systemd-coredump-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-devel-249.4-2.2.ppc64le",
"product": {
"name": "systemd-devel-249.4-2.2.ppc64le",
"product_id": "systemd-devel-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-doc-249.4-2.2.ppc64le",
"product": {
"name": "systemd-doc-249.4-2.2.ppc64le",
"product_id": "systemd-doc-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-experimental-249.4-2.2.ppc64le",
"product": {
"name": "systemd-experimental-249.4-2.2.ppc64le",
"product_id": "systemd-experimental-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-249.4-2.2.ppc64le",
"product": {
"name": "systemd-journal-remote-249.4-2.2.ppc64le",
"product_id": "systemd-journal-remote-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-lang-249.4-2.2.ppc64le",
"product": {
"name": "systemd-lang-249.4-2.2.ppc64le",
"product_id": "systemd-lang-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-logger-249.4-2.2.ppc64le",
"product": {
"name": "systemd-logger-249.4-2.2.ppc64le",
"product_id": "systemd-logger-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-network-249.4-2.2.ppc64le",
"product": {
"name": "systemd-network-249.4-2.2.ppc64le",
"product_id": "systemd-network-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-portable-249.4-2.2.ppc64le",
"product": {
"name": "systemd-portable-249.4-2.2.ppc64le",
"product_id": "systemd-portable-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-249.4-2.2.ppc64le",
"product": {
"name": "systemd-sysvinit-249.4-2.2.ppc64le",
"product_id": "systemd-sysvinit-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "systemd-testsuite-249.4-2.2.ppc64le",
"product": {
"name": "systemd-testsuite-249.4-2.2.ppc64le",
"product_id": "systemd-testsuite-249.4-2.2.ppc64le"
}
},
{
"category": "product_version",
"name": "udev-249.4-2.2.ppc64le",
"product": {
"name": "udev-249.4-2.2.ppc64le",
"product_id": "udev-249.4-2.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-249.4-2.2.s390x",
"product": {
"name": "libsystemd0-249.4-2.2.s390x",
"product_id": "libsystemd0-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-249.4-2.2.s390x",
"product": {
"name": "libsystemd0-32bit-249.4-2.2.s390x",
"product_id": "libsystemd0-32bit-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "libudev-devel-249.4-2.2.s390x",
"product": {
"name": "libudev-devel-249.4-2.2.s390x",
"product_id": "libudev-devel-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "libudev-devel-32bit-249.4-2.2.s390x",
"product": {
"name": "libudev-devel-32bit-249.4-2.2.s390x",
"product_id": "libudev-devel-32bit-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-249.4-2.2.s390x",
"product": {
"name": "libudev1-249.4-2.2.s390x",
"product_id": "libudev1-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-249.4-2.2.s390x",
"product": {
"name": "libudev1-32bit-249.4-2.2.s390x",
"product_id": "libudev1-32bit-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "nss-myhostname-249.4-2.2.s390x",
"product": {
"name": "nss-myhostname-249.4-2.2.s390x",
"product_id": "nss-myhostname-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "nss-myhostname-32bit-249.4-2.2.s390x",
"product": {
"name": "nss-myhostname-32bit-249.4-2.2.s390x",
"product_id": "nss-myhostname-32bit-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "nss-mymachines-249.4-2.2.s390x",
"product": {
"name": "nss-mymachines-249.4-2.2.s390x",
"product_id": "nss-mymachines-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "nss-mymachines-32bit-249.4-2.2.s390x",
"product": {
"name": "nss-mymachines-32bit-249.4-2.2.s390x",
"product_id": "nss-mymachines-32bit-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "nss-resolve-249.4-2.2.s390x",
"product": {
"name": "nss-resolve-249.4-2.2.s390x",
"product_id": "nss-resolve-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "nss-systemd-249.4-2.2.s390x",
"product": {
"name": "nss-systemd-249.4-2.2.s390x",
"product_id": "nss-systemd-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-249.4-2.2.s390x",
"product": {
"name": "systemd-249.4-2.2.s390x",
"product_id": "systemd-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-32bit-249.4-2.2.s390x",
"product": {
"name": "systemd-32bit-249.4-2.2.s390x",
"product_id": "systemd-32bit-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-container-249.4-2.2.s390x",
"product": {
"name": "systemd-container-249.4-2.2.s390x",
"product_id": "systemd-container-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-coredump-249.4-2.2.s390x",
"product": {
"name": "systemd-coredump-249.4-2.2.s390x",
"product_id": "systemd-coredump-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-devel-249.4-2.2.s390x",
"product": {
"name": "systemd-devel-249.4-2.2.s390x",
"product_id": "systemd-devel-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-doc-249.4-2.2.s390x",
"product": {
"name": "systemd-doc-249.4-2.2.s390x",
"product_id": "systemd-doc-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-experimental-249.4-2.2.s390x",
"product": {
"name": "systemd-experimental-249.4-2.2.s390x",
"product_id": "systemd-experimental-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-249.4-2.2.s390x",
"product": {
"name": "systemd-journal-remote-249.4-2.2.s390x",
"product_id": "systemd-journal-remote-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-lang-249.4-2.2.s390x",
"product": {
"name": "systemd-lang-249.4-2.2.s390x",
"product_id": "systemd-lang-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-logger-249.4-2.2.s390x",
"product": {
"name": "systemd-logger-249.4-2.2.s390x",
"product_id": "systemd-logger-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-network-249.4-2.2.s390x",
"product": {
"name": "systemd-network-249.4-2.2.s390x",
"product_id": "systemd-network-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-portable-249.4-2.2.s390x",
"product": {
"name": "systemd-portable-249.4-2.2.s390x",
"product_id": "systemd-portable-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-249.4-2.2.s390x",
"product": {
"name": "systemd-sysvinit-249.4-2.2.s390x",
"product_id": "systemd-sysvinit-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "systemd-testsuite-249.4-2.2.s390x",
"product": {
"name": "systemd-testsuite-249.4-2.2.s390x",
"product_id": "systemd-testsuite-249.4-2.2.s390x"
}
},
{
"category": "product_version",
"name": "udev-249.4-2.2.s390x",
"product": {
"name": "udev-249.4-2.2.s390x",
"product_id": "udev-249.4-2.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libsystemd0-249.4-2.2.x86_64",
"product": {
"name": "libsystemd0-249.4-2.2.x86_64",
"product_id": "libsystemd0-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "libsystemd0-32bit-249.4-2.2.x86_64",
"product": {
"name": "libsystemd0-32bit-249.4-2.2.x86_64",
"product_id": "libsystemd0-32bit-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-devel-249.4-2.2.x86_64",
"product": {
"name": "libudev-devel-249.4-2.2.x86_64",
"product_id": "libudev-devel-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "libudev-devel-32bit-249.4-2.2.x86_64",
"product": {
"name": "libudev-devel-32bit-249.4-2.2.x86_64",
"product_id": "libudev-devel-32bit-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-249.4-2.2.x86_64",
"product": {
"name": "libudev1-249.4-2.2.x86_64",
"product_id": "libudev1-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "libudev1-32bit-249.4-2.2.x86_64",
"product": {
"name": "libudev1-32bit-249.4-2.2.x86_64",
"product_id": "libudev1-32bit-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-249.4-2.2.x86_64",
"product": {
"name": "nss-myhostname-249.4-2.2.x86_64",
"product_id": "nss-myhostname-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "nss-myhostname-32bit-249.4-2.2.x86_64",
"product": {
"name": "nss-myhostname-32bit-249.4-2.2.x86_64",
"product_id": "nss-myhostname-32bit-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-249.4-2.2.x86_64",
"product": {
"name": "nss-mymachines-249.4-2.2.x86_64",
"product_id": "nss-mymachines-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "nss-mymachines-32bit-249.4-2.2.x86_64",
"product": {
"name": "nss-mymachines-32bit-249.4-2.2.x86_64",
"product_id": "nss-mymachines-32bit-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "nss-resolve-249.4-2.2.x86_64",
"product": {
"name": "nss-resolve-249.4-2.2.x86_64",
"product_id": "nss-resolve-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "nss-systemd-249.4-2.2.x86_64",
"product": {
"name": "nss-systemd-249.4-2.2.x86_64",
"product_id": "nss-systemd-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-249.4-2.2.x86_64",
"product": {
"name": "systemd-249.4-2.2.x86_64",
"product_id": "systemd-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-32bit-249.4-2.2.x86_64",
"product": {
"name": "systemd-32bit-249.4-2.2.x86_64",
"product_id": "systemd-32bit-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-container-249.4-2.2.x86_64",
"product": {
"name": "systemd-container-249.4-2.2.x86_64",
"product_id": "systemd-container-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-coredump-249.4-2.2.x86_64",
"product": {
"name": "systemd-coredump-249.4-2.2.x86_64",
"product_id": "systemd-coredump-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-devel-249.4-2.2.x86_64",
"product": {
"name": "systemd-devel-249.4-2.2.x86_64",
"product_id": "systemd-devel-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-doc-249.4-2.2.x86_64",
"product": {
"name": "systemd-doc-249.4-2.2.x86_64",
"product_id": "systemd-doc-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-experimental-249.4-2.2.x86_64",
"product": {
"name": "systemd-experimental-249.4-2.2.x86_64",
"product_id": "systemd-experimental-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-journal-remote-249.4-2.2.x86_64",
"product": {
"name": "systemd-journal-remote-249.4-2.2.x86_64",
"product_id": "systemd-journal-remote-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-lang-249.4-2.2.x86_64",
"product": {
"name": "systemd-lang-249.4-2.2.x86_64",
"product_id": "systemd-lang-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-logger-249.4-2.2.x86_64",
"product": {
"name": "systemd-logger-249.4-2.2.x86_64",
"product_id": "systemd-logger-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-network-249.4-2.2.x86_64",
"product": {
"name": "systemd-network-249.4-2.2.x86_64",
"product_id": "systemd-network-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-portable-249.4-2.2.x86_64",
"product": {
"name": "systemd-portable-249.4-2.2.x86_64",
"product_id": "systemd-portable-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-sysvinit-249.4-2.2.x86_64",
"product": {
"name": "systemd-sysvinit-249.4-2.2.x86_64",
"product_id": "systemd-sysvinit-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "systemd-testsuite-249.4-2.2.x86_64",
"product": {
"name": "systemd-testsuite-249.4-2.2.x86_64",
"product_id": "systemd-testsuite-249.4-2.2.x86_64"
}
},
{
"category": "product_version",
"name": "udev-249.4-2.2.x86_64",
"product": {
"name": "udev-249.4-2.2.x86_64",
"product_id": "udev-249.4-2.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64"
},
"product_reference": "libsystemd0-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le"
},
"product_reference": "libsystemd0-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x"
},
"product_reference": "libsystemd0-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64"
},
"product_reference": "libsystemd0-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64"
},
"product_reference": "libsystemd0-32bit-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le"
},
"product_reference": "libsystemd0-32bit-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x"
},
"product_reference": "libsystemd0-32bit-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsystemd0-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64"
},
"product_reference": "libsystemd0-32bit-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64"
},
"product_reference": "libudev-devel-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le"
},
"product_reference": "libudev-devel-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x"
},
"product_reference": "libudev-devel-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64"
},
"product_reference": "libudev-devel-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64"
},
"product_reference": "libudev-devel-32bit-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le"
},
"product_reference": "libudev-devel-32bit-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x"
},
"product_reference": "libudev-devel-32bit-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev-devel-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64"
},
"product_reference": "libudev-devel-32bit-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64"
},
"product_reference": "libudev1-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le"
},
"product_reference": "libudev1-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev1-249.4-2.2.s390x"
},
"product_reference": "libudev1-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64"
},
"product_reference": "libudev1-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64"
},
"product_reference": "libudev1-32bit-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le"
},
"product_reference": "libudev1-32bit-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x"
},
"product_reference": "libudev1-32bit-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libudev1-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64"
},
"product_reference": "libudev1-32bit-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-myhostname-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64"
},
"product_reference": "nss-myhostname-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-myhostname-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le"
},
"product_reference": "nss-myhostname-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-myhostname-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x"
},
"product_reference": "nss-myhostname-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-myhostname-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64"
},
"product_reference": "nss-myhostname-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-myhostname-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64"
},
"product_reference": "nss-myhostname-32bit-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-myhostname-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le"
},
"product_reference": "nss-myhostname-32bit-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-myhostname-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x"
},
"product_reference": "nss-myhostname-32bit-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-myhostname-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64"
},
"product_reference": "nss-myhostname-32bit-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-mymachines-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64"
},
"product_reference": "nss-mymachines-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-mymachines-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le"
},
"product_reference": "nss-mymachines-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-mymachines-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x"
},
"product_reference": "nss-mymachines-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-mymachines-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64"
},
"product_reference": "nss-mymachines-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-mymachines-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64"
},
"product_reference": "nss-mymachines-32bit-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-mymachines-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le"
},
"product_reference": "nss-mymachines-32bit-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-mymachines-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x"
},
"product_reference": "nss-mymachines-32bit-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-mymachines-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64"
},
"product_reference": "nss-mymachines-32bit-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-resolve-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64"
},
"product_reference": "nss-resolve-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-resolve-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le"
},
"product_reference": "nss-resolve-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-resolve-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x"
},
"product_reference": "nss-resolve-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-resolve-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64"
},
"product_reference": "nss-resolve-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-systemd-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64"
},
"product_reference": "nss-systemd-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-systemd-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le"
},
"product_reference": "nss-systemd-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-systemd-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x"
},
"product_reference": "nss-systemd-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "nss-systemd-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64"
},
"product_reference": "nss-systemd-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-249.4-2.2.aarch64"
},
"product_reference": "systemd-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le"
},
"product_reference": "systemd-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-249.4-2.2.s390x"
},
"product_reference": "systemd-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-249.4-2.2.x86_64"
},
"product_reference": "systemd-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64"
},
"product_reference": "systemd-32bit-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le"
},
"product_reference": "systemd-32bit-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x"
},
"product_reference": "systemd-32bit-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-32bit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64"
},
"product_reference": "systemd-32bit-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64"
},
"product_reference": "systemd-container-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le"
},
"product_reference": "systemd-container-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x"
},
"product_reference": "systemd-container-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-container-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64"
},
"product_reference": "systemd-container-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64"
},
"product_reference": "systemd-coredump-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le"
},
"product_reference": "systemd-coredump-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x"
},
"product_reference": "systemd-coredump-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-coredump-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64"
},
"product_reference": "systemd-coredump-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64"
},
"product_reference": "systemd-devel-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le"
},
"product_reference": "systemd-devel-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x"
},
"product_reference": "systemd-devel-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-devel-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64"
},
"product_reference": "systemd-devel-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-doc-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64"
},
"product_reference": "systemd-doc-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-doc-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le"
},
"product_reference": "systemd-doc-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-doc-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x"
},
"product_reference": "systemd-doc-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-doc-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64"
},
"product_reference": "systemd-doc-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-experimental-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64"
},
"product_reference": "systemd-experimental-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-experimental-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le"
},
"product_reference": "systemd-experimental-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-experimental-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x"
},
"product_reference": "systemd-experimental-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-experimental-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64"
},
"product_reference": "systemd-experimental-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64"
},
"product_reference": "systemd-journal-remote-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le"
},
"product_reference": "systemd-journal-remote-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x"
},
"product_reference": "systemd-journal-remote-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-journal-remote-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64"
},
"product_reference": "systemd-journal-remote-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-lang-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64"
},
"product_reference": "systemd-lang-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-lang-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le"
},
"product_reference": "systemd-lang-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-lang-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x"
},
"product_reference": "systemd-lang-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-lang-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64"
},
"product_reference": "systemd-lang-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-logger-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64"
},
"product_reference": "systemd-logger-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-logger-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le"
},
"product_reference": "systemd-logger-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-logger-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x"
},
"product_reference": "systemd-logger-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-logger-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64"
},
"product_reference": "systemd-logger-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-network-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64"
},
"product_reference": "systemd-network-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-network-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le"
},
"product_reference": "systemd-network-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-network-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x"
},
"product_reference": "systemd-network-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-network-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64"
},
"product_reference": "systemd-network-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-portable-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64"
},
"product_reference": "systemd-portable-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-portable-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le"
},
"product_reference": "systemd-portable-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-portable-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x"
},
"product_reference": "systemd-portable-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-portable-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64"
},
"product_reference": "systemd-portable-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64"
},
"product_reference": "systemd-sysvinit-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le"
},
"product_reference": "systemd-sysvinit-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x"
},
"product_reference": "systemd-sysvinit-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-sysvinit-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64"
},
"product_reference": "systemd-sysvinit-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-testsuite-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64"
},
"product_reference": "systemd-testsuite-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-testsuite-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le"
},
"product_reference": "systemd-testsuite-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-testsuite-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x"
},
"product_reference": "systemd-testsuite-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "systemd-testsuite-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64"
},
"product_reference": "systemd-testsuite-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-249.4-2.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:udev-249.4-2.2.aarch64"
},
"product_reference": "udev-249.4-2.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-249.4-2.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:udev-249.4-2.2.ppc64le"
},
"product_reference": "udev-249.4-2.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-249.4-2.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:udev-249.4-2.2.s390x"
},
"product_reference": "udev-249.4-2.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "udev-249.4-2.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
},
"product_reference": "udev-249.4-2.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-10156"
}
],
"notes": [
{
"category": "general",
"text": "A flaw in systemd v228 in /src/basic/fs-util.c caused world writable suid files to be created when using the systemd timers features, allowing local attackers to escalate their privileges to root. This is fixed in v229.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-10156",
"url": "https://www.suse.com/security/cve/CVE-2016-10156"
},
{
"category": "external",
"summary": "SUSE Bug 1020601 for CVE-2016-10156",
"url": "https://bugzilla.suse.com/1020601"
},
{
"category": "external",
"summary": "SUSE Bug 1021969 for CVE-2016-10156",
"url": "https://bugzilla.suse.com/1021969"
},
{
"category": "external",
"summary": "SUSE Bug 1086936 for CVE-2016-10156",
"url": "https://bugzilla.suse.com/1086936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-10156"
},
{
"cve": "CVE-2017-15908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-15908"
}
],
"notes": [
{
"category": "general",
"text": "In systemd 223 through 235, a remote DNS server can respond with a custom crafted DNS NSEC resource record to trigger an infinite loop in the dns_packet_read_type_window() function of the \u0027systemd-resolved\u0027 service and cause a DoS of the affected service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-15908",
"url": "https://www.suse.com/security/cve/CVE-2017-15908"
},
{
"category": "external",
"summary": "SUSE Bug 1065276 for CVE-2017-15908",
"url": "https://bugzilla.suse.com/1065276"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2017-15908"
},
{
"cve": "CVE-2017-18078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18078"
}
],
"notes": [
{
"category": "general",
"text": "systemd-tmpfiles in systemd before 237 attempts to support ownership/permission changes on hardlinked files even if the fs.protected_hardlinks sysctl is turned off, which allows local users to bypass intended access restrictions via vectors involving a hard link to a file for which the user lacks write access, as demonstrated by changing the ownership of the /etc/passwd file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18078",
"url": "https://www.suse.com/security/cve/CVE-2017-18078"
},
{
"category": "external",
"summary": "SUSE Bug 1077925 for CVE-2017-18078",
"url": "https://bugzilla.suse.com/1077925"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-18078"
},
{
"cve": "CVE-2017-9445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-9445"
}
],
"notes": [
{
"category": "general",
"text": "In systemd through 233, certain sizes passed to dns_packet_new in systemd-resolved can cause it to allocate a buffer that\u0027s too small. A malicious DNS server can exploit this via a response with a specially crafted TCP payload to trick systemd-resolved into allocating a buffer that\u0027s too small, and subsequently write arbitrary data beyond the end of it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-9445",
"url": "https://www.suse.com/security/cve/CVE-2017-9445"
},
{
"category": "external",
"summary": "SUSE Bug 1045290 for CVE-2017-9445",
"url": "https://bugzilla.suse.com/1045290"
},
{
"category": "external",
"summary": "SUSE Bug 1063249 for CVE-2017-9445",
"url": "https://bugzilla.suse.com/1063249"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-9445"
},
{
"cve": "CVE-2018-15686",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-15686"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability in unit_deserialize of systemd allows an attacker to supply arbitrary state across systemd re-execution via NotifyAccess. This can be used to improperly influence systemd execution and possibly lead to root privilege escalation. Affected releases are systemd versions up to and including 239.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-15686",
"url": "https://www.suse.com/security/cve/CVE-2018-15686"
},
{
"category": "external",
"summary": "SUSE Bug 1113665 for CVE-2018-15686",
"url": "https://bugzilla.suse.com/1113665"
},
{
"category": "external",
"summary": "SUSE Bug 1120323 for CVE-2018-15686",
"url": "https://bugzilla.suse.com/1120323"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-15686"
},
{
"cve": "CVE-2018-15687",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-15687"
}
],
"notes": [
{
"category": "general",
"text": "A race condition in chown_one() of systemd allows an attacker to cause systemd to set arbitrary permissions on arbitrary files. Affected releases are systemd versions up to and including 239.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-15687",
"url": "https://www.suse.com/security/cve/CVE-2018-15687"
},
{
"category": "external",
"summary": "SUSE Bug 1113666 for CVE-2018-15687",
"url": "https://bugzilla.suse.com/1113666"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-15687"
},
{
"cve": "CVE-2018-15688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-15688"
}
],
"notes": [
{
"category": "general",
"text": "A buffer overflow vulnerability in the dhcp6 client of systemd allows a malicious dhcp6 server to overwrite heap memory in systemd-networkd. Affected releases are systemd: versions up to and including 239.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-15688",
"url": "https://www.suse.com/security/cve/CVE-2018-15688"
},
{
"category": "external",
"summary": "SUSE Bug 1113632 for CVE-2018-15688",
"url": "https://bugzilla.suse.com/1113632"
},
{
"category": "external",
"summary": "SUSE Bug 1113668 for CVE-2018-15688",
"url": "https://bugzilla.suse.com/1113668"
},
{
"category": "external",
"summary": "SUSE Bug 1113669 for CVE-2018-15688",
"url": "https://bugzilla.suse.com/1113669"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-15688"
},
{
"cve": "CVE-2018-16864",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16864"
}
],
"notes": [
{
"category": "general",
"text": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when a program with long command line arguments calls syslog. A local attacker may use this flaw to crash systemd-journald or escalate his privileges. Versions through v240 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16864",
"url": "https://www.suse.com/security/cve/CVE-2018-16864"
},
{
"category": "external",
"summary": "SUSE Bug 1108912 for CVE-2018-16864",
"url": "https://bugzilla.suse.com/1108912"
},
{
"category": "external",
"summary": "SUSE Bug 1120323 for CVE-2018-16864",
"url": "https://bugzilla.suse.com/1120323"
},
{
"category": "external",
"summary": "SUSE Bug 1122265 for CVE-2018-16864",
"url": "https://bugzilla.suse.com/1122265"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2018-16864",
"url": "https://bugzilla.suse.com/1188063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-16864"
},
{
"cve": "CVE-2018-16865",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-16865"
}
],
"notes": [
{
"category": "general",
"text": "An allocation of memory without limits, that could result in the stack clashing with another memory region, was discovered in systemd-journald when many entries are sent to the journal socket. A local attacker, or a remote one if systemd-journal-remote is used, may use this flaw to crash systemd-journald or execute code with journald privileges. Versions through v240 are vulnerable.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-16865",
"url": "https://www.suse.com/security/cve/CVE-2018-16865"
},
{
"category": "external",
"summary": "SUSE Bug 1108912 for CVE-2018-16865",
"url": "https://bugzilla.suse.com/1108912"
},
{
"category": "external",
"summary": "SUSE Bug 1120323 for CVE-2018-16865",
"url": "https://bugzilla.suse.com/1120323"
},
{
"category": "external",
"summary": "SUSE Bug 1122265 for CVE-2018-16865",
"url": "https://bugzilla.suse.com/1122265"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2018-16865",
"url": "https://bugzilla.suse.com/1188063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-16865"
},
{
"cve": "CVE-2018-21029",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-21029"
}
],
"notes": [
{
"category": "general",
"text": "systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-21029",
"url": "https://www.suse.com/security/cve/CVE-2018-21029"
},
{
"category": "external",
"summary": "SUSE Bug 1155539 for CVE-2018-21029",
"url": "https://bugzilla.suse.com/1155539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2018-21029"
},
{
"cve": "CVE-2018-6954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-6954"
}
],
"notes": [
{
"category": "general",
"text": "systemd-tmpfiles in systemd through 237 mishandles symlinks present in non-terminal path components, which allows local users to obtain ownership of arbitrary files via vectors involving creation of a directory and a file under that directory, and later replacing that directory with a symlink. This occurs even if the fs.protected_symlinks sysctl is turned on.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-6954",
"url": "https://www.suse.com/security/cve/CVE-2018-6954"
},
{
"category": "external",
"summary": "SUSE Bug 1080919 for CVE-2018-6954",
"url": "https://bugzilla.suse.com/1080919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2018-6954"
},
{
"cve": "CVE-2019-20386",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-20386"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in button_open in login/logind-button.c in systemd before 243. When executing the udevadm trigger command, a memory leak may occur.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-20386",
"url": "https://www.suse.com/security/cve/CVE-2019-20386"
},
{
"category": "external",
"summary": "SUSE Bug 1161436 for CVE-2019-20386",
"url": "https://bugzilla.suse.com/1161436"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2019-20386"
},
{
"cve": "CVE-2019-3842",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3842"
}
],
"notes": [
{
"category": "general",
"text": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3842",
"url": "https://www.suse.com/security/cve/CVE-2019-3842"
},
{
"category": "external",
"summary": "SUSE Bug 1132348 for CVE-2019-3842",
"url": "https://bugzilla.suse.com/1132348"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3842"
},
{
"cve": "CVE-2019-3843",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3843"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a systemd service that uses DynamicUser property can create a SUID/SGID binary that would be allowed to run as the transient service UID/GID even after the service is terminated. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the UID/GID will be recycled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3843",
"url": "https://www.suse.com/security/cve/CVE-2019-3843"
},
{
"category": "external",
"summary": "SUSE Bug 1133506 for CVE-2019-3843",
"url": "https://bugzilla.suse.com/1133506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3843"
},
{
"cve": "CVE-2019-3844",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-3844"
}
],
"notes": [
{
"category": "general",
"text": "It was discovered that a systemd service that uses DynamicUser property can get new privileges through the execution of SUID binaries, which would allow to create binaries owned by the service transient group with the setgid bit set. A local attacker may use this flaw to access resources that will be owned by a potentially different service in the future, when the GID will be recycled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-3844",
"url": "https://www.suse.com/security/cve/CVE-2019-3844"
},
{
"category": "external",
"summary": "SUSE Bug 1133509 for CVE-2019-3844",
"url": "https://bugzilla.suse.com/1133509"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-3844"
},
{
"cve": "CVE-2019-6454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-6454"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in sd-bus in systemd 239. bus_process_object() in libsystemd/sd-bus/bus-objects.c allocates a variable-length stack buffer for temporarily storing the object path of incoming D-Bus messages. An unprivileged local user can exploit this by sending a specially crafted message to PID1, causing the stack pointer to jump over the stack guard pages into an unmapped memory region and trigger a denial of service (systemd PID1 crash and kernel panic).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-6454",
"url": "https://www.suse.com/security/cve/CVE-2019-6454"
},
{
"category": "external",
"summary": "SUSE Bug 1125352 for CVE-2019-6454",
"url": "https://bugzilla.suse.com/1125352"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-6454"
},
{
"cve": "CVE-2020-13529",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-13529"
}
],
"notes": [
{
"category": "general",
"text": "An exploitable denial-of-service vulnerability exists in Systemd 245. A specially crafted DHCP FORCERENEW packet can cause a server running the DHCP client to be vulnerable to a DHCP ACK spoofing attack. An attacker can forge a pair of FORCERENEW and DCHP ACK packets to reconfigure the server.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-13529",
"url": "https://www.suse.com/security/cve/CVE-2020-13529"
},
{
"category": "external",
"summary": "SUSE Bug 1185972 for CVE-2020-13529",
"url": "https://bugzilla.suse.com/1185972"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-13529"
},
{
"cve": "CVE-2020-1712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-1712"
}
],
"notes": [
{
"category": "general",
"text": "A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-1712",
"url": "https://www.suse.com/security/cve/CVE-2020-1712"
},
{
"category": "external",
"summary": "SUSE Bug 1162108 for CVE-2020-1712",
"url": "https://bugzilla.suse.com/1162108"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-1712"
},
{
"cve": "CVE-2021-33910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33910"
}
],
"notes": [
{
"category": "general",
"text": "basic/unit-name.c in systemd prior to 246.15, 247.8, 248.5, and 249.1 has a Memory Allocation with an Excessive Size Value (involving strdupa and alloca for a pathname controlled by a local attacker) that results in an operating system crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33910",
"url": "https://www.suse.com/security/cve/CVE-2021-33910"
},
{
"category": "external",
"summary": "SUSE Bug 1188062 for CVE-2021-33910",
"url": "https://bugzilla.suse.com/1188062"
},
{
"category": "external",
"summary": "SUSE Bug 1188063 for CVE-2021-33910",
"url": "https://bugzilla.suse.com/1188063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libsystemd0-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev-devel-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-249.4-2.2.x86_64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:libudev1-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-myhostname-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-mymachines-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-resolve-249.4-2.2.x86_64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:nss-systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-32bit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-container-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-coredump-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-devel-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-doc-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-experimental-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-journal-remote-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-lang-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-logger-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-network-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-portable-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-sysvinit-249.4-2.2.x86_64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.aarch64",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.s390x",
"openSUSE Tumbleweed:systemd-testsuite-249.4-2.2.x86_64",
"openSUSE Tumbleweed:udev-249.4-2.2.aarch64",
"openSUSE Tumbleweed:udev-249.4-2.2.ppc64le",
"openSUSE Tumbleweed:udev-249.4-2.2.s390x",
"openSUSE Tumbleweed:udev-249.4-2.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-33910"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: 2021-10-15 - Updated: 2021-10-15
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"initial_release_date": "2021-10-15T00:00:00",
"last_revision_date": "2021-10-15T00:00:00",
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2026-AVI-0281
Vulnerability from certfr_avis - Published: 2026-03-12 - Updated: 2026-03-12
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk AppDynamics Private Synthetic Agent | Splunk AppDynamics Private Synthetic Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk AppDynamics On-Premises Enterprise Console | Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x antérieures à 26.1.1 | ||
| Splunk | Splunk AppDynamics Database Agent | Splunk AppDynamics Database Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.0.2503 antérieures à 10.0.2503.12 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.124 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.9 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.2.x antérieures à 10.2.1 | ||
| Splunk | Splunk AppDynamics NodeJS Agent | Splunk AppDynamics NodeJS Agent versions 25.12.x antérieures à 25.12.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.4 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.10 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.1.2507 antérieures à 10.1.2507.17 | ||
| Splunk | Splunk AppDynamics Java Agent | Splunk AppDynamics Java Agent versions 26.1.x antérieures à 26.1.0 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 10.2.2510 antérieures à 10.2.2510.7 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk AppDynamics Private Synthetic Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Private Synthetic Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics On-Premises Enterprise Console versions 26.1.x ant\u00e9rieures \u00e0 26.1.1",
"product": {
"name": "Splunk AppDynamics On-Premises Enterprise Console",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Database Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Database Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.0.2503 ant\u00e9rieures \u00e0 10.0.2503.12",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.124",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.9",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.2.x ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics NodeJS Agent versions 25.12.x ant\u00e9rieures \u00e0 25.12.1",
"product": {
"name": "Splunk AppDynamics NodeJS Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.10",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.1.2507 ant\u00e9rieures \u00e0 10.1.2507.17",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Java Agent versions 26.1.x ant\u00e9rieures \u00e0 26.1.0",
"product": {
"name": "Splunk AppDynamics Java Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 10.2.2510 ant\u00e9rieures \u00e0 10.2.2510.7",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2018-16864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16864"
},
{
"name": "CVE-2025-48073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48073"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-11219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11219"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1594"
},
{
"name": "CVE-2025-3887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3887"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-4574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4574"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12433"
},
{
"name": "CVE-2025-12444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12444"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2025-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11213"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-12036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12036"
},
{
"name": "CVE-2012-0871",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0871"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-0518",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0518"
},
{
"name": "CVE-2025-69223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69223"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-12438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12438"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-26464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26464"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2025-12435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12435"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2013-4394",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4394"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2025-64183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64183"
},
{
"name": "CVE-2025-13226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13226"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-47808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47808"
},
{
"name": "CVE-2021-46877",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46877"
},
{
"name": "CVE-2026-2391",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2391"
},
{
"name": "CVE-2017-18078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18078"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2019-17571",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17571"
},
{
"name": "CVE-2025-11207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11207"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-13223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13223"
},
{
"name": "CVE-2025-12431",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12431"
},
{
"name": "CVE-2026-23745",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23745"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2024-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7246"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2026-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21226"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2025-12726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12726"
},
{
"name": "CVE-2025-12445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12445"
},
{
"name": "CVE-2025-12437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12437"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2025-69230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69230"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-0716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0716"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-12434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12434"
},
{
"name": "CVE-2025-69225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69225"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-12439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12439"
},
{
"name": "CVE-2018-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16865"
},
{
"name": "CVE-2025-14874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14874"
},
{
"name": "CVE-2020-17521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-17521"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2025-48072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48072"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-12432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12432"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2026-20165",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20165"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-22919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22919"
},
{
"name": "CVE-2024-23672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23672"
},
{
"name": "CVE-2025-69227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69227"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-12443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12443"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-6602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6602"
},
{
"name": "CVE-2025-11215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11215"
},
{
"name": "CVE-2013-4393",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4393"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2025-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11205"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-12725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12725"
},
{
"name": "CVE-2022-23305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23305"
},
{
"name": "CVE-2025-11208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11208"
},
{
"name": "CVE-2025-68161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68161"
},
{
"name": "CVE-2024-8372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8372"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11756"
},
{
"name": "CVE-2025-59730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59730"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2025-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13033"
},
{
"name": "CVE-2022-23307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23307"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11212"
},
{
"name": "CVE-2025-12495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12495"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-12840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12840"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-11458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11458"
},
{
"name": "CVE-2020-1712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1712"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12429"
},
{
"name": "CVE-2026-20164",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20164"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-11211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11211"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2026-23950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23950"
},
{
"name": "CVE-2023-26118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26118"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-69228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69228"
},
{
"name": "CVE-2025-59250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59250"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-47807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47807"
},
{
"name": "CVE-2025-47806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47806"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-64182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64182"
},
{
"name": "CVE-2023-52428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52428"
},
{
"name": "CVE-2023-6604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6604"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2017-9217",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9217"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-64181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64181"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-12436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12436"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2025-13230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13230"
},
{
"name": "CVE-2013-4327",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4327"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-12446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12446"
},
{
"name": "CVE-2025-13228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13228"
},
{
"name": "CVE-2013-4391",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4391"
},
{
"name": "CVE-2026-20166",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20166"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-12441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12441"
},
{
"name": "CVE-2024-29371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29371"
},
{
"name": "CVE-2025-47183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47183"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2023-6601",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6601"
},
{
"name": "CVE-2018-16888",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16888"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-69226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69226"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-13224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13224"
},
{
"name": "CVE-2025-13042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13042"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2025-11460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11460"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-13229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13229"
},
{
"name": "CVE-2024-24549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24549"
},
{
"name": "CVE-2025-12440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12440"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-11216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11216"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2018-1049",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1049"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-11210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11210"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2022-31159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31159"
},
{
"name": "CVE-2025-12729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12729"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-13227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13227"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2025-10256",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10256"
},
{
"name": "CVE-2026-20162",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20162"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-12839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12839"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-37727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37727"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2019-3844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3844"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-12728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12728"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2023-6605",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6605"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2022-23302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23302"
},
{
"name": "CVE-2025-12430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12430"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2025-11206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11206"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2018-15686",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15686"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9951"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-59729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59729"
},
{
"name": "CVE-2025-48071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48071"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-26604",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26604"
},
{
"name": "CVE-2025-69224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69224"
},
{
"name": "CVE-2025-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2759"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-30153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30153"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-69229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69229"
},
{
"name": "CVE-2024-8373",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8373"
},
{
"name": "CVE-2025-11209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11209"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2024-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21490"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2023-49501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49501"
},
{
"name": "CVE-2019-3843",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3843"
},
{
"name": "CVE-2018-6954",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6954"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2026-26981",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26981"
},
{
"name": "CVE-2025-12447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12447"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2013-4392",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4392"
},
{
"name": "CVE-2025-48074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48074"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2016-7795",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7795"
},
{
"name": "CVE-2025-12727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12727"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-12428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12428"
},
{
"name": "CVE-2026-20163",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20163"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2026-03-12T00:00:00",
"last_revision_date": "2026-03-12T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0281",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-12T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0302",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0302"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0311",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0311"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0308",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0308"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0309",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0309"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0305",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0305"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0310",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0310"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0304",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0304"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0301",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0301"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0313",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0313"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0306",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0306"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0303",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0303"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0307",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0307"
},
{
"published_at": "2026-03-11",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2026-0312",
"url": "https://advisory.splunk.com/advisories/SVD-2026-0312"
}
]
}
GSD-2019-3842
Vulnerability from gsd - Updated: 2023-12-13 01:24{
"GSD": {
"alias": "CVE-2019-3842",
"description": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"id": "GSD-2019-3842",
"references": [
"https://www.suse.com/security/cve/CVE-2019-3842.html",
"https://www.debian.org/security/2019/dsa-4428",
"https://access.redhat.com/errata/RHSA-2021:3900",
"https://access.redhat.com/errata/RHSA-2021:1611",
"https://ubuntu.com/security/CVE-2019-3842",
"https://linux.oracle.com/cve/CVE-2019-3842.html",
"https://packetstormsecurity.com/files/cve/CVE-2019-3842"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-3842"
],
"details": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"id": "GSD-2019-3842",
"modified": "2023-12-13T01:24:04.749632Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-3842",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "systemd",
"version": {
"version_data": [
{
"version_value": "v242-rc4"
}
]
}
}
]
},
"vendor_name": "The systemd Project"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"."
}
]
},
"impact": {
"cvss": [
[
{
"vectorString": "4.5/CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
}
]
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-285"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"
},
{
"name": "FEDORA-2019-3fa5db9e19",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/"
},
{
"name": "46743",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/46743/"
},
{
"name": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html",
"refsource": "MISC",
"url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"
},
{
"name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"
},
{
"name": "openSUSE-SU-2019:1450",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"
},
{
"name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E"
},
{
"name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:systemd_project:systemd:242:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:systemd_project:systemd:242:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:systemd_project:systemd:242:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:systemd_project:systemd:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "241",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2019-3842"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\"."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842",
"refsource": "CONFIRM",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"
},
{
"name": "FEDORA-2019-3fa5db9e19",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Release Notes",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC/"
},
{
"name": "46743",
"refsource": "EXPLOIT-DB",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.exploit-db.com/exploits/46743/"
},
{
"name": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory",
"VDB Entry"
],
"url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"
},
{
"name": "[debian-lts-announce] 20190424 [SECURITY] [DLA 1762-1] systemd security update",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"
},
{
"name": "openSUSE-SU-2019:1450",
"refsource": "SUSE",
"tags": [
"Third Party Advisory"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"
},
{
"name": "[bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E"
},
{
"name": "[bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8",
"refsource": "MLIST",
"tags": [
"Third Party Advisory"
],
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.4,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.4,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.0,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-01-31T18:51Z",
"publishedDate": "2019-04-09T21:29Z"
}
}
}
GHSA-C23J-QP89-Q76C
Vulnerability from github – Published: 2022-05-13 01:04 – Updated: 2022-05-13 01:04In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the "allow_active" element rather than "allow_any".
{
"affected": [],
"aliases": [
"CVE-2019-3842"
],
"database_specific": {
"cwe_ids": [
"CWE-863"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-04-09T21:29:00Z",
"severity": "HIGH"
},
"details": "In systemd before v242-rc4, it was discovered that pam_systemd does not properly sanitize the environment before using the XDG_SEAT variable. It is possible for an attacker, in some particular configurations, to set a XDG_SEAT environment variable which allows for commands to be checked against polkit policies using the \"allow_active\" element rather than \"allow_any\".",
"id": "GHSA-c23j-qp89-q76c",
"modified": "2022-05-13T01:04:09Z",
"published": "2022-05-13T01:04:09Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-3842"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3842"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00022.html"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/STR36RJE4ZZIORMDXRERVBHMPRNRTHAC"
},
{
"type": "WEB",
"url": "https://www.exploit-db.com/exploits/46743"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00062.html"
},
{
"type": "WEB",
"url": "http://packetstormsecurity.com/files/152610/systemd-Seat-Verification-Active-Session-Spoofing.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.